نتایج جستجو برای: bilateral authentication
تعداد نتایج: 117646 فیلتر نتایج به سال:
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
abstract governing was disorganized for years, when mongols attached to iran and it caused to clearing way for interference of mongols princes. dispatching of holaku to the west culminated in establishing iilkhanan government. holakus activities in destruction of abbaasis government and activities which shows his staying in iran, made force oulus juji to comparison against iilkhanis gover...
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
summary: pheochromocytoma is an adrenal tumor characterized by symptoms of hypertension, headache, increased sweating, and tachycardia .in one third of patients, the tumor is discovered incidentally during radiological evaluation of the abdomen. in this article a case of bilateral pheochromocytoma is reported. the patient, a twelve years old boy, referred with complaints of headache, flushing, ...
rectus sheath hematoma usually occurs unilateral but rare cases of bilateral hematoma have been reported. herein we report the first case of spontaneous bilateral rectus sheath hematoma in the kidney transplanted patient.
background: nepeta menthoides boiss & buhse is a species from lamiaceae family. it is used as a herbal medicine with common name “ostokhodus” in iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. objective: in this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of n. me...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید