نتایج جستجو برای: key
تعداد نتایج: 553708 فیلتر نتایج به سال:
â â â â abul-atahiya: his life and poems â â mohammad ali otroshi shahreza * â hossein kiani ** â â abstract â abul-atahiya was born and grown up in kufa-iraq, a city chosen as the central city by shias and the abbasid dynasty publicized their government there. he lived in a period which slander was common so he kept company with adulterous people and acted dishonorably. he started compo...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
â â â â â abstract: â china and asean have been maintaining a relationship both cooperative and competitive in the textile trade. due to its labor intensive feature and high dependence on foreign trade , the textile trade has received much attention after the 2008 financial crisis. the customs data (classified by the hs code) from year 2006-2009 is employed to research the impact of the cris...
The most common solution for implementing access control into a dynamic group is to use a group key unknown to all but the users in the group. The group key (i.e., session key) is updated for every session throughout the lifetime of the group with the procedure of group key distribution. In this paper, we propose a group key distribution scheme with self-healing property that enables users in a...
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authentica...
for any educational program to be successful, many factors work hand in hand. based on pervious efl studies, teachers and learners are the keys to gain achievement. granted the fact that explicit and implicit practice plays a key role in education, knowledge of it can help teachers facilitate students’ vocabulary learning. this study investigated to determine the contribution of explicit and i...
The Internet Key Exchange (IKE) and Public Key Infrastructure for X.509 (PKIX) certificate profile both provide frameworks that must be profiled for use in a given application. This document provides a profile of IKE and PKIX that defines the requirements for using PKI technology in the context of IKE/IPsec. The document complements protocol specifications such as IKEv1 and IKEv2, which assume ...
Wireless sensor networks is composed of a large number of randomly deployed sensor nodes with limited computing ability and memory space. These characteristics gives rise to much challenge to key agreement. General key agreement schemes like KDC, PKI and Diffie-Hellman key exchange schemes are not applicable to the sensor networks. Several key distribution schemes have been proposed specificall...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید