نتایج جستجو برای: protocol analysis
تعداد نتایج: 3017806 فیلتر نتایج به سال:
the present study-both qualitative and quantitative--explored fifty efl learners’ preferences for receiving error feedback on different grammatical units as well as their beliefs about teacher feedback strategies. the study also examined the effect of the students’ level of writing ability on their views about the importance of teacher feedback on different error types. data was gathered throug...
Extended Abstract Background and objectives: Google Earth images are a valuable resource for understanding and studying the natural area's ecology due to their high spatial resolution. Considering that these images have been available for many years, in our country, these valuable data have not been used enough, especially in order to study vegetation and optimal natural areas management. So, ...
در این پژوهش به منظور برآورد تابش خالص برای مکان یابی نیروگاه های خورشیدی با پردازش تصاویر ماهواره ای در استان کردستان از دو روش sebal و روش solar analysis استفاده شده است در روش sebal از داده های تصاویر ماهواره ای مودیس 2000، 2003، 2006، 2009، 2012 داده های ساعات آفتابی در7 ایستگاه سینوپتیک در سطح استان کردستان ( داده های روزانه) و برای روش solar analysis از تصاویر دم منطقه با قدرت 30 و 90 متر...
Abstract Introduction: Domestic violence has been one of the most common social harms throughout human history and due to its widespread effect, pathology and treatment of this phenomenon has always been considered by therapists. Aim: This study aimed to investigate the efficiency of the modified protocol for trauma-focused cognitive behavioral therapy on mental distress and Immunoglobulin...
increasing the popularity of sip based services (voip, iptv, ims infrastructure) lead to concerns about its security. the main signaling protocol of next generation networks and voip systems is session initiation protocol (sip). inherent vulnerabilities of sip, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in sip based infra...
We reveal instances of unsoundness, incompleteness, and redundancy in the cryptographic protocol analysis logic of Gong, Needham and Yahalom. Solutions are proposed for each of these problems. The logic is extended to formalize the use of an uncertiied key in the Yahalom protocol, and our analysis of the protocol suggests the possibility of a redundancy in the protocol.
We present a reduction semantics for the LYSA calculus extended with session information, for modelling cryptographic protocols, and a static analysis for it. If a protocol passes the analysis then it is free of replay attacks and thus preserves freshness. The analysis has been implemented and applied to a number of protocols, including both original and corrected version of Needham-Schroeder p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید