نتایج جستجو برای: owner

تعداد نتایج: 8917  

2016
Jiamin Shi Daniel Buschek Florian Alt

Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. Co...

Journal: :IACR Cryptology ePrint Archive 2016
Jorge Munilla

Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes which solve most of the security weaknesses detected in previously published protocols. However, this paper reviews this work and points out that such schemes still present some practical and secu...

2018
Krisztina Kovács Zsófia Virányi Anna Kis Borbála Turcsán Ágnes Hudecz Maria T. Marmota Dóra Koller Zsolt Rónai Márta Gácsi József Topál

Citation: Kovács K, Virányi Z, Kis A, Turcsán B, Hudecz Á, Marmota MT, Koller D, Rónai Z, Gácsi M and Topál J (2018) Dog-Owner Attachment Is Associated With Oxytocin Receptor Gene Polymorphisms in Both Parties. A Comparative Study on Austrian and Hungarian Border Collies. Front. Psychol. 9:435. doi: 10.3389/fpsyg.2018.00435 Dog-Owner Attachment Is Associated With Oxytocin Receptor Gene Polymorp...

Journal: :Parallel Processing Letters 1995
Rolf Niedermeier Peter Rossmanith

Received (received date) Revised (revised date) Communicated by (Editor Name) ABSTRACT We investigate parallel algorithms to compute recursively deened functions. Our computational model are parallel random access machines (PRAM's). We preferably make use of the OROW-PRAM (owner read, owner write), a model supposed to be even weaker and more realistic than the EREW-PRAM (exclusive read, exclusi...

1995
ROLF NIEDERMEIER

Received (received date) Revised (revised date) Communicated by (Editor Name) ABSTRACT We investigate parallel algorithms to compute recursively deened functions. Our computational model are parallel random access machines (PRAM's). We preferably make use of the OROW-PRAM (owner read, owner write), a model supposed to be even weaker and more realistic than the EREW-PRAM (exclusive read, exclusi...

Journal: :RFC 2012
Dick Hardt

The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf. This specification replaces and obsoletes the OAuth 1.0 protocol described...

2016
Darshan Chavan P. M. Yawalkar

With the limited computing power cloud permit users to outsource their data. However, a security issue has been always obstacle to the use of computing outsourcing. Recently, there is huge growth in the use of number of security passwords for web based application and encryption keys required to securely outsource the data. User encrypts the data using encryption before uploading it on cloud an...

2012
Hanh Tran David G. Carmichael

Cash flow, Markov chains, contractor payment, owner classification

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید