نتایج جستجو برای: alice code

تعداد نتایج: 173826  

2001
Valeri Korjik Guillermo Morales-Luna Vladimir B. Balakirsky

Secret key agreement protocol between legal parties based on reconciliation and privacy amplification procedure has been considered in [2]. The so called privacy amplification theorem is used to estimate the amount of Shannon’s information leaking to an illegal party (passive eavesdropper) about the final key. We consider a particular case where one of the legal parties (Alice) sends to another...

M. Mirzaii, M. Sadeghi, Z. Gholamzadeh,

Background: Solid targets that consist of powder and electrodeposited targets are used commonly to produce radionuclides by accelerators. Since silver is easily electrodeposited in cyanide baths and has a very excellent thermal conductivity, the electrodeposited target is preferable to produce 109Cd. To avoid cracking or peeling of the target during bombardment, it should have a level surface a...

2010
Dariush Sardari Pooneh Saidi

Nuclear interactions of the projectile carbon ion in biological soft tissue for cancer treatment purpose are studied. Elastic interaction of carbon ion with carbon, oxygen and nitrogen nuclei existing in soft tissue leads to beam divergence especially in Bragg peak region, where the carbon ion is slowing down. Monte Carlo simulation shows the amount of carbon ion beam divergence in soft tissue....

2011

(a) Alice and Bob wish to resolve a dispute over telephone. We can encode the possibilities of the dispute by a binary value. For this they engage a protocol: i. Alice → Bob: Alice picks up randomly an x, which is a 200 bit number and computes the function f(x). Alice sends f(x) to Bob. ii. Bob → Alice: Bob tells Alice whether x was even or odd. iii. Alice → Bob: Alice then sends x to Bob, so t...

2012
Alan Kaminsky

Alice is a user. Clyde is a cloud service provider. Alice has a bunch of very large files containing many, many words. Alice wants to store the files in the cloud. Alice wants to do a particular form of private information retrieval (PIR); specifically: Alice wants to determine which file or files contain a given target word. Alice wants Clyde to do the necessary computations (or most of the co...

2000
I. Kanter E. Kanter L. Ein - Dor

(received ; accepted) PACS. .89.90n – Computer science and technology. Abstract. – A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented. The complexity of the encryption and the decryption processes scale linearly with the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted by B...

2012
Ali Zibaeenejad

The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem in a wireless network as propagated signals can be easily captured by unauthorized receivers, and so achieving a perfectly secure communication is a desire in such a wiretap channel. On the other hand, cryptographic algor...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه دریانوردی و علوم دریایی چابهار - دانشکده مهندسی دریا 1391

سازمان های قانون گذار صنعت دریانوردی، سالهای زیادی سعی خویش را در جهت بهبود این صنعت، از طریق ارائه استانداردهای فنی، کاربرد تکنولوژی های جدید و تصویب قوانین بین المللی مرتبط با این استانداردها و تکنولوژی ها صرف نمودند. بررسی سوانح دریایی نشان داد که عامل انسانی سهم عمده ای از دلایل وقوع حوادث ناگوار دریایی می باشد. imo از سال 1998 در راستای پیشگیری از خطای انسانی در کشتی های کنوانسیونی، استقرا...

2005
TING GAO ZHIXI WANG Z. X. Wang

Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید