نتایج جستجو برای: e identity

تعداد نتایج: 1127292  

Journal: :Zootaxa 2015
Lauri Kaila Tomasz Baran Marko Mutanen

The Elachista dispilella group and its subordinate E. dispilella species complex are characterized. Identity of the long confused oldest names applicable for taxa in the E. dispilella complex, i.e., E. dispilella Zeller, E. festucicolella Zeller, and E. distigmatella Frey, is resolved. Elachista dispilella Zeller is the valid name for the species often identified as E. festucicolella, E. steuer...

2008
Mohd M. Anwar Jim E. Greer

In every communicative context, each participant assumes some kind of role and negotiates some type of relationship with their counterparts. In the e-learning domain, the roles (e.g. instructor, learner, marker, administrator, etc.) for participants are well structured and relationships (e.g. one-to-one, one-to-many, hierarchical, etc.) among roles are relatively predictable. This paper propose...

Journal: :CoRR 2015
Tanmoy Maitra

Smart card based authentication schemes are used in various fields like e-banking, e-commerce, wireless sensor networks, medical system and so on to authenticate the both remote user and the application server during the communication via internet. Recently, Karuppiah and Saravanan proposed an authentication scheme which is based on password and one-way cryptographic hash function. They have us...

2013
J. P. MAY

0 //K ⊂ //E q //Q //1. Here K stands for kernel and Q stands for quotient. She assumed that K is abelian (= commutative), so she wrote its product as + with identity element 0. She did not assume that Q is abelian, so she wrote its product as · with identity element 1. That explains the joke notation with 0 at the left and 1 at the right. The sequence is exact, which means that K is a normal su...

2006
Orhan Çetinkaya Ali Doğanaksoy

We describe a practical e-voting protocol which guarantees e-voting protocol requirements: eligibility, privacy, accuracy, fairness, receipt-freeness, uncoercibility, robustness and verifiability. Unlike existing blind signature based protocols, in which the authority blindly signs ballot or part of ballot, the authority in our protocol blindly signs voter’s pseudo identity. Hereafter, voter be...

2012
Marcos Rogério André Carla Roberta Freschi Márcia Cristina Alves Teixeira Rosangela Zacarias Machado

Ehrlichiosis is a tick-borne disease that affects both humans and animals. The few existing reports on ehrlichiosis in Brazilian cats have been based on observation of morulae in leukocytes and, more recently, on molecular detection of Ehrlichia sp. In this study, we assessed occurrences of Ehrlichia sp. in the blood of 200 domestic cats in São Luís, Maranhão. Of the 200 animals tested, 11 (5.5...

2010

ŠŠeššo, Luka. 2008. Legende i pri e iz Istre. Pi an: Legendfest. ŠŠeššo, Luka. 2009. ““Nadnaravna bi a u kontekstu etnologijskih istražživanja tradicijskih vjerovanja u dalmatinskom zale u danas””. Doktorska disertacija. Rukopis Odsjeka za etnologiju Hrvatske akademije znanosti i umjetnosti. NZ 195. ŠŠtambuk, Maja. 1981. ““Sociodemografske promijene i perspektive razvitka sela Biokova””. Sociol...

2005
David Chau

LTA is a lightweight trust architecture that fights phishing attacks by authenticating e-mail messages. LTA uses separable identity-based ring signatures, which are more attractive than traditional digital signatures for e-mail signing. Because the signatures are identity-based, users do not need to generate keys ahead of time. And because the ring signatures are repudiable, users do not need t...

2001
Sandro Rafaeli Marc Rennhard Laurent Mathy Bernhard Plattner David Hutchison

Current e-commerce practice enforces a customer to disclose her identify to the e-shop. The use of credit cards makes it straightforward for an e-shop to know the real identity of its customers. Although, there are some payment systems based on untraceable tokens, they are not as widely used as credit cards. Furthermore, even without buying anything, a customer is already disclosing some inform...

2003
Craig H. Bassing Robert E. Tillman Barbara B. Woodman David Canty Robert J. Monroe Barry P. Sleckman Frederick W. Alt

T cell receptor (TCR) and variable region genes are assembled from germ-line gene segments located in a single chromosomal locus in which TCR segments are situated between TCR segments. The TCR enhancer (E ) located at the 3 end of the TCR locus functions over a long chromosomal distance to promote TCR rearrangement and maximal TCR expression; whereas the TCR enhancer (E ) is located among the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید