نتایج جستجو برای: aka

تعداد نتایج: 1885  

2015
Richard E. W. Berl Barry S. Hewlett

Studies in Western cultures have observed that both children and adults tend to overimitate, copying causally irrelevant actions in the presence of clear causal information. Investigation of this feature in non-Western groups has found little difference cross-culturally in the frequency or manner with which individuals overimitate. However, each of the non-Western populations studied thus far h...

2004
J. Arkko H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP-AKA includes optional identity privac...

Journal: :IACR Cryptology ePrint Archive 2011
Farshid Farhat Somayeh Salimi Ahmad Salahi

Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this paper, we investigate UMTS AKA and some other proposed schemes. Then, we explore the known weaknesses of the previous frameworks suggested for the UMTS AKA pro...

Journal: :The Journal of rheumatology 2000
A Kessel I Rosner E Zuckerman T D Golan E Toubi

OBJECTIVE To investigate whether antikeratin antibodies (AKA) could be useful in the differential diagnosis of patients with rheumatoid arthritis (RA) compared to patients with hepatitis C virus (HCV) associated polyarthritis, who are seropositive for rheumatoid factor (RF). METHODS AKA were assayed in 3 different groups of patients; all were RF seropositive: Group 1: 25 patients with HCV ass...

2011
Mohamed Maachaoui Anas Abou El Kalam Christian Fraboul

The IMS (IP Multimedia Subsystem) architecture is the key control for next generation networks (NGN). IMS gives network operators the opportunity to extend their services, including voice and multimedia communications and deliver them in new environments with new goals. Its security is paramount, especially authentication. In IMS, authentication is divided into two phases a PS (Packet-Switch) d...

2012
Li Xiehua

The 3 Generation Partnership Project(3GPP) standard is developing System Architecture Evolution(SAE) / Long Term Evolution(LTE) for the next generation mobile communication system. In the SAE/LTE architecture, EPS AKA(Evolved Packet System Authentication and Key Agreement) procedure is used to provide mutual authentication between the UE(User Equipment) and the serving network. However the EPS ...

2006
J. Arkko V. Lehtovirta P. Eronen

This specification defines a new EAP method, EAP-AKA’, which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation ...

2002
H. Haverinen

This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...

2015
Akira Kogure Kazuhiko Kotani Shigehiko Katada Hiroshi Takagi Masahiro Kamikozuru Takashi Isaji Setsuo Hakata Roberta W. Scherer

STUDY DESIGN Cized, single-blind, controlled trial. OBJECTIVE To investigate the efficacy of the Arthrokinematic approach (AKA)-Hakata (H) method for chronic low back pain. SUMMARY OF BACKGROUND DATA The AKA-H method is used to manually treat abnormalities of intra-articular movement. METHODS One hundred eighty-six patients with chronic nonspecific low back pain randomly received either t...

Journal: :Journal of Technology Education 1994

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید