نتایج جستجو برای: identification key

تعداد نتایج: 936593  

ژورنال: :مجله گیاهشناسی ایران 2013
فریبا شریف نیا معصومه حسن بارانی مصطفی اسدی

در راستای بازنگری نمونه های هرباریومی متعلق به جنس delphinium، گونه d. kurdicum boiss. & hohen. برای اولین بار از غرب ایران گزارش می گردد. همچنین، گونه d. zalil aitch & hemsl. به عنوان یک گونه مستقل از d. semibarbatum bienert ex boiss. معرفی شده است. این گونه با گونه مجاور خود d. ochrolecum stev. ex  dc. مقایسه شده است. این گونه ها براساس ویژگی های مورفولوژیکی، گرده شناسی و الگوی اپیدرم...

ژورنال: :مجله گیاهشناسی ایران 2011
زهرا یزدانبخش رمضان علی خاوری نژاد مسعود شیدایی مریم کشاورزی

هدف از این تحقیق، مطالعه صفات تشریحی و استفاده از آنها به منظور دستیابی به صفات تشریحی افتراقی برگ جهت تفکیک بهتر گونه های جنس oryzopsis s. l. می باشد. بدین منظور، ساختار تشریحی برگ (بشره پشتی و برش عرضی) در 10 گونه از جنس oryzopsis s. l. در ایران برای اولین بار مورد بررسی قرار گرفت. در این تحقیق 43 صفت کمی و کیفی در 23 جمعیت کدگذاری و ارزیابی شدند. این صفات در میان گونه ها متغیر، اما در بین نم...

Journal: :IACR Cryptology ePrint Archive 2015
Ka Ahmad Khoureich

This paper offers a new version of the hHB protocol denoted Light-hHB. This proposal uses the same framework as hHB, that is a two stages protocol: the first one for the establishment of a session key between the reader and the tag and the second one similar to HB+. We also introduce in this paper a novel and lightweight key exchange protocol inspired by the BB84 protocol named the non-quantum ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...

2008
Ari Juels Ravikanth Pappu Bryan Parno

We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) Key sharing across space, i.e., across simultaneously emitted values that may follow different data paths and (2) Key sharing across time, i.e., in temporally staggered emissions. Our constructions are of general inter...

Journal: :CoRR 2009
Amin Daneshmand Malayeri Jalal Abdollahi

Nowadays, using cryptographic systems play an effective role in security and safety technologies. One of the most applied kind of cryptography is Symmetric Cryptography and its applications. New aspects of symmetric Cryptography methodologies and applications has been presented by this paper. Security-based networks and some complex technologies such as RFID and parallel security settings has b...

Journal: :IACR Cryptology ePrint Archive 2010
Christopher Wolf Bart Preneel

In this article, we propose an identification scheme which is based on the two combinatorial problems Multivariate Quadratic equations (MQ) and Isomorphism of Polynomials (IP). We show that this scheme is statistical zero-knowledge. Using a trapdoor for the MQ-problem, it is possible to make it also identity-based, i.e., there is no need for distributing public keys or for certificates within t...

2006
Danny De Cock Christopher Wolf Bart Preneel

Currently, Belgium is introducing an electronic version of its identity card. In this article, we shortly describe the card, and give a brief introduction to its cryptographic features. In particular, we focus on the Public-Key Infrastructure (PKI) associated with the card.

2011
Miroslaw Kutylowski Lukasz Krzywiecki Przemyslaw Kubiak Michal Koza

2012
Jung-Hui Chiu

This research study and analyse the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing inappropriate. We proposed a scheme to improve the mechanisms for authentication, no a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید