نتایج جستجو برای: keychain

تعداد نتایج: 35  

Journal: :iranian journal of fuzzy systems 2010
s ngcibi v murali b. b makamba

in this paper we enumerate fuzzy subgroups, up to a natural equivalence, of some finite abelian p-groups of rank two where p is any prime number. after obtaining the number of maximal chains of subgroups, we count fuzzy subgroups using inductive arguments. the number of such fuzzy subgroups forms a polynomial in p with pleasing combinatorial coefficients. by exploiting the order, we label the s...

Journal: :iranian journal of fuzzy systems 0
isaac k. appiah department of mathematics, university of fort hare, alice, 5700, south africa b. b. makamba department of mathematics, university of fort hare, alice, 5700, south africa

in this paper we classify fuzzy subgroups of a rank-3 abelian group $g = mathbb{z}_{p^n} + mathbb{z}_p + mathbb{z}_p$ for any fixed prime $p$ and any positive integer $n$, using a natural equivalence relation given in cite{mur:01}. we present and prove explicit polynomial formulae for the number of (i) subgroups, (ii) maximal chains of subgroups, (iii) distinct fuzzy subgroups, (iv) non-isomorp...

Journal: :Int. J. Communication Systems 2017
Muhammad Bilal Shin-Gak Kang

Authentication is the first step toward establishing a service provider and customer (C-P) association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence. This work presents a secure and lightweight keying and authentication protocol suite termed TAP (TimeAssisted Authentication P...

2006
Yih-Chun Hu Kenneth P. Laberteaux

This article proposes a security authentication process that is well-suited for Vehicular Ad-hoc Networks (VANET). As compared to current Public Key Infrastructure (PKI) proposals for VANET authentication, the scheme is significantly more efficient with regard to bandwidth and computation. The scheme uses time as the creator of asymmetric knowledge. A sender creates a long chain of keys. Each k...

Journal: :CoRR 2018
Kyong-Tak Cho Yuseung Kim Kang G. Shin

We find that the conventional belief of vehicle cyber attacks and their defenses—attacks are feasible and thus defenses are required only when the vehicle’s ignition is turned on—does not hold. We verify this fact by discovering and applying two new practical and important attacks: battery-drain and Denial-of-Body-control (DoB). The former can drain the vehicle battery while the latter can prev...

Journal: :IACR Cryptology ePrint Archive 2013
Hervé Chabanne Jean-Michel Cioranesco Vincent Despiegel Jean-Christophe Fondeur David Naccache

Physical authentication brings extra security to software authentication by adding real-world input to conventional authentication protocols. Existing solutions such as textual and graphical passwords are subject to brute force and shoulder surfing attacks, while users are reluctant to use biometrics for identification, due to its intrusiveness. This paper uses Hamiltonian tokens as authenticat...

Journal: :Besaung : jurnal seni desain dan budaya 2023

Kota Palembang merupakan kota yang di dalamnya terdapat banyak destinasi wisata baik alam, buatan manusia, ataupun sejarah dan budaya. ibu provinsi Sumatera Selatan. Kajian utama penelitian ini dititikberatkan pada identifikasi, analisa perancangan karya prototype board game media pendukung lainnya. Perancangan menggunakan metode perencanaan design thinking meliputi premedia, main follow up med...

Journal: :Journal of Computer Science 2023

Wireless Sensor Networks (WSNs) are collections of sensor nodes that can help people monitor things wirelessly, replacing the need for human presence in hard-to-reach areas. While forwarding first communication reduces delays among nodes, it lacks a security mechanism. Since have limited resources, using complex measures shorten their lifetime. This study proposes protocol modification forward ...

2004
Pan Wang Peng Ning Douglas S. Reeves

Secure group communication relies on secure and robust distribution of group keys. A stateless group key distribution scheme is an ideal candidate when the communication channel is unreliable. Several stateless group key distribution schemes have been proposed. However, these schemes require all users store a certain number of auxiliary keys. The number of such keys increases as the group size ...

Journal: :iranian journal of fuzzy systems 2015
babington makamba odilo ndiweni

in this paper we classify fuzzy subgroups of the dihedral group $d_{pqrs}$  for distinct primes  $p$, $q$, $r$ and $s$. this follows similar work we have done on distinct fuzzy subgroups of some dihedral groups.we present formulae for the number of (i) distinct maximal chains of subgroups, (ii) distinct fuzzy subgroups and (iii) non-isomorphic classes of fuzzy subgroups under our chosen equival...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید