نتایج جستجو برای: proxy

تعداد نتایج: 25930  

Journal: :Interação - Revista de Ensino, Pesquisa e Extensão 2019

Journal: :iranian journal of science and technology (sciences) 2014
m. r. rasaei

intelligent wells provide the ability for monitoring and control of downhole environment of the wells. downhole monitoring is achieved through sensors while control is realized with downhole valves. recovery from intelligent wells can be improved by proper selection of candidate wells/fields and optimizing the number, location and performance of the installed interval control valves. design cri...

Journal: :IEEE Transactions on Information Forensics and Security 2023

Recently, it has been widely known that deep neural networks are highly vulnerable and easily broken by adversarial attacks. To mitigate the vulnerability, many defense algorithms have proposed. to improve robustness, works try enhance feature representation imposing more direct supervision on discriminative feature. However, existing approaches lack an understanding of learning adversarially r...

Journal: :International Journal of Informatics and Communication Technology (IJ-ICT) 2014

Arabia considers Iran the main source of instability in the region and believes that Iran seeks to dominate the Sunni Arabs through creating Shiite crescent. Especially after the Islamic Revolution, two countries have been as the rivals in the Persian Gulf. Ideological competition is considered as the core of competition in the areas of geopolitics, geostrategics and geoeconomics. In recent yea...

2008
Jacob C. N. Schuldt Kanta Matsuura Kenneth G. Paterson

We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...

Journal: :Telecommunication Systems 1999
Tony Przygienda Patrick Droz Colin H. West

ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...

Journal: :Journal of Law, Economics, and Organization 2000

2012
Sattar J Aboud Mohammad Al-fayoumi

The idea of a proxy signature scheme was first presented by Mambo et al. [1] in 1996. Their proxy signature scheme allows an original signer to delegate his signing right to a proxy signer to sign the message on behalf of an original signer. Later, the verifier, which knows the public keys of original signer and a proxy signer can check a validity of a proxy signature issued by a proxy signer. ...

Journal: :Materials Today 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید