نتایج جستجو برای: mac cammy fuchs method

تعداد نتایج: 1657039  

Journal: :International Journal of Communication Systems 2009

Journal: :Acta Ophthalmologica 2017

2004
Dietmar Fuchs Arno Hausen Gilbert Reibnegger Ernst R. Werner Manfred P. Dierich Helmut Wachter

CLINICALCHEMISTRY, Vol. 34, No. 2, 1988 461 3. Huber C, Batchelor JR, Fuchs D, et al. Immune response-associatedproduction of neopterin-release from macrophages primanly under control of interferon-gamma. J Exp Med 1984;160:310-6. 4. Nathan CF. Peroxide and pteridine: a hypothesis onthe regulationof macrophage antimicrobial activity by interferon-gainma. In: Greaser I, Vilcek J, eds.Interferon,...

Journal: :I. J. Network Security 2007
Dayin Wang Dongdai Lin Wenling Wu

We can view an existing Message Authentication Code (MAC) as a Carter-Wegman MAC in spite of the fact it may not have been designed as one. This will make the analysis easier than it has been when considered from other viewpoints. In this paper, we can look PMAC with two keys as a Carter-Wegman MAC and get a simple security proof for it. Using this viewpoint to look at PMAC, we will learn not o...

2006
YALING YANG

Due to the limited bandwidth in wireless networks, careful resource allocation schemes must be used to allocate bandwidth to applications. There are two typical types of applications in wireless networks that require resource allocation: soft realtime applications and best effort applications. While soft realtime applications require QoS support for effective bandwidth utilization, best effort ...

Journal: :IEICE Transactions 2009
Pham Thanh Giang Kenji Nakagawa

IEEE 802.11 MAC protocol for medium access control in wireless Local Area Networks (LANs) is the de facto standard for wireless ad hoc networks. However, it does not perform well in terms of fairness, delay and throughput specially, in multihop networks. The problem is due to both the MAC and link layer contentions. Many research papers have been published in these fields. Among them, a modific...

2013
Martin Gagné Pascal Lafourcade Yassine Lakhnech

Message authentication codes (MACs) are an essential primitive in cryptography. They are used to ensure the integrity and authenticity of a message, and can also be used as a building block for larger schemes, such as chosenciphertext secure encryption, or identity-based encryption. MACs are often built in two steps: first, the ‘front end’ of the MAC produces a short digest of the long message,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید