نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

Journal: :Synthese 2017
Dimitris Tsementzis

The Univalent Foundations of Mathematics (UF) provide not only an entirely non-Cantorian conception of the basic objects of mathematics (“homotopy types” instead of “sets”) but also a novel account of how foundations ought to relate to mathematical practice. In this paper, I intend to answer the question: In what way is UF a new foundation of mathematics? I will begin by connecting UF to a prag...

Journal: :J. Comb. Theory, Ser. A 2002
Vince Grolmusz Benny Sudakov

We prove a version of the Ray-Chaudhuri–Wilson and Frankl–Wilson theorems for k-wise intersections and also generalize a classical code-theoretic result of Delsarte for k-wise Hamming distances. A set of code-words a; a; . . . ; ak of length n have k-wise Hamming-distance ‘; if there are exactly ‘ such coordinates, where not all of their coordinates coincide (alternatively, exactly n ‘ of their...

2001
Vince Grolmusz

We prove a version of the Ray-Chaudhuri{Wilson and Frankl-Wilson theorems for kwise intersections and also generalize a classical code-theoretic result of Delsarte for k-wise Hamming distances. A set of code-words a1; a2; : : : ; ak of length n have k-wise Hamming-distance `, if there are exactly ` such coordinates, where not all of their coordinates coincide (alternatively, exactly n ` of thei...

2014
Devane Satish

Remote EAP-SIM authentication has an overwhelming impact on the authentication delay. RADIUS protocol can be used for local authentication which reduces authentication latency. However, in case of EAP-SIM authentication, where triplets are to be retrieved from a remote authentication gateway (AuC), this does not help much. An Improved EAP-SIM authentication method was proposed in [2]. In this p...

Journal: :IT Professional 2019

Journal: :Physical Review A 2002

Journal: :Theoretical Computer Science 2004

Journal: :Biology of Blood and Marrow Transplantation 2013

Journal: :International Journal of Engineering and Advanced Technology 2021

2009
Jinwei Wang Jianmin Lü Shiguo Lian Guangjie Liu

At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature-based authentication schemes in which the signature is generated by the multimedia content and is not embedded into the multimedia content. The ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید