نتایج جستجو برای: unilateral authentication

تعداد نتایج: 74220  

Journal: :world journal of plastic surgery 0
madhumita gupta department of plastic and reconstructive surgery, ipgme & r, kolkata, india ashwin alke pai department of plastic and reconstructive surgery, ipgme & r, kolkata, india abhimanyu bhattacharya department of plastic and reconstructive surgery, ipgme & r, kolkata, india ravi ramachandra department of plastic and reconstructive surgery, ipgme & r, kolkata, india raghavendra sawarappa department of plastic and reconstructive surgery, ipgme & r, kolkata, india subhakanta mohapatra department of plastic and reconstructive surgery, ipgme & r, kolkata, india

apert syndrome is a congenital craniosynostosis syndrome comprising of bilateral coronal synostosis , symmetric syndactyly of hands and feet and midface hypoplasia. we present an atypical phenotype of this syndrome with right sided unilateral coronal synostosis. however, type i apert hand and other clinical and radiological features suggestthe diagnosis. genetic analysis revealed an absence of ...

Journal: :archives of anesthesiology and critical care 0
hosseinali jelvehmoghadam anesthesiology research center, loghman hakim medical center, shahid beheshti university of medical sciences, tehran, iran maziar mobasher department of critical care, shahid madani medical center, alborz university of medical sciences, karaj, iran. sevak hatamian alborz university of medical sciences hooman bahrami motlagh beheshti university of medical sciences masoum khoshfetrat zahedan university of medical sciences mohammadreza hajiesmaeili shahid beheshti university of medical sciences

one of the more infrequent congenital diseases with a wide spectrum of symptoms and more complications of the right side of pulmonary artery (63% according to ten harkel) is unilateral pulmonary artery agenesis (upaa). the clinical presentation is variable, and many patients can be asymptomatic for many years and even throughout their lives. although the disease more frequently appears in child...

2004
Zinaida Benenson Felix Gärtner Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

Journal: :Int. J. Comput. Math. 2008
Rongxing Lu Xiaodong Lin Zhenfu Cao Liuquan Qin Xiaohui Liang

Deniable authentication protocol is a new authentication mechanism in secure computer communication, which not only enables an intended receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. In this paper, based on the Diffie-Hellman algorithm, we propose a new simple deniable authentication protocol from a provably secu...

Journal: :RFC 2011
Yaron Sheffer Glen Zorn Hannes Tschofenig Scott R. Fluhrer

The Extensible Authentication Protocol (EAP) describes a framework that allows the use of multiple authentication mechanisms. This document defines an authentication mechanism for EAP called EAP-EKE, based on the Encrypted Key Exchange (EKE) protocol. This method provides mutual authentication through the use of a short, easy to remember password. Compared with other common authentication metho...

2005
J. Chin M. Parkin N. Zhang A. Nenadic J. M. Brooke

Current Grid software lacks support for authentication techniques other than PKIbased digital certificates. Support for multiple authentication technologies is important, particularly in information Grids, where classified resources/data should enjoy fine-grained protection. This paper describes our work in the design and implementation of a Grid authentication middleware. The solution, called ...

2013
Diogo Menezes Ferrazani Mattos

In this work, we propose a host authentication and access control architecture for software defined networks. The key idea is to authenticate at Layer 2, using IEEE 802.1X standard and Extensible Authentication Protocol (EAP). EAP exchanges authentication information between the supplicant host and a RADIUS authentication server. We developed the proposed authenticator as an OpenFlow applicatio...

2013
W. Michael Petullo Jon A. Solworth

Authentication primitives should be simple, general, and robust against attack. We describe the authentication mechanisms of Ethos, an experimental, clean-slate operating system that has been designed for security. We reexamine and redesign software layering for authentication, and evaluate the resulting security properties. In Ethos, integrated network security and simplified local authenticat...

2012
Younghwa An

To improve the security weaknesses in user authentication system, many biometrics-based user authentication schemes using smart cards have been proposed. Das in 2011, proposed an effective biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security flaws of Li-Hwang’s scheme. In this paper, ...

2004
Zinaida Benenson Felix C. Freiling Dogan Kesdogan

If the data collected within a sensor network is valuable or should be kept confidential then security measures should protect the access to this data. We focus on user authentication, a central problem when trying to build access control mechanisms for sensor networks. We first sketch some security issues in the context of user authentication in sensor networks. We then introduce the notion of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید