نتایج جستجو برای: deniable authentication

تعداد نتایج: 35051  

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

2009
Mummoorthy Murugesan Chris Clifton

Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). In July 2006, AOL released an anonymized search query log of some 600K randomly selected users. While valuable as a research tool, the anonymization was insufficient: individuals were identified from the contents of the q...

Journal: :فصلنامه علمی پژوهشی گیاهان دارویی 0
n kahkeshani tehran university of medical sciences m khanavi tehran university of medical sciences a hadjiakhoondi department of pharmacognosy and medicinal plants research center, faculty of pharmacy, tehran university of medical sciences, tehran, iran tel: tel/fax: +98 21 66494996

background: nepeta menthoides boiss & buhse is a species from lamiaceae family. it is used as a herbal medicine with common name “ostokhodus” in iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. objective: in this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of n. me...

2004
Yevgeniy Dodis Rafael Pass Shabsi Walfish

We introduce and realize the notion of fully simulatable multiparty computation. Unlike any of the previous models, our notion simultaneously enjoys the following features: • Main feature: The simulator does not have any extra power over the “real-life” adversary. In particular, it cannot program any public parameters or run in super-polynomial time. Thus, our implementation is fully deniable f...

2015
Shengli Liu Kenneth G. Paterson

We study simulation-based, selective opening security against chosen-ciphertext attacks (SIM-SO-CCA security) for public key encryption (PKE). In a selective opening, chosen-ciphertext attack (SO-CCA), an adversary has access to a decryption oracle, sees a vector of ciphertexts, adaptively chooses to open some of them, and obtains the corresponding plaintexts and random coins used in the creati...

Journal: :IRA-International Journal of Technology & Engineering (ISSN 2455-4480) 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید