نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

Journal: :Journal of Computer Security 2011
Basel Alomair Loukas Lazos Radha Poovendran

In this paper, we explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authentication and random number generation. For parties equipped with a good source of randomness and a secure cryptographic primitive to authenticate messages, the literature of cryptography is rich with wellstu...

Journal: :Electronics 2023

The Internet is a conduit for vast quantities of digital data, with the transmission images being especially prevalent due to widespread use social media. However, this popularity has led an increase in security concerns such as image tampering and forgery. As result, authentication become critical technology that cannot be overlooked. Recently, numerous researchers have focused on developing t...

Journal: :CoRR 2011
Elloá B. Guedes Francisco Marcos de Assis

In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the cha...

Journal: :Statistics and its interface 2013
Grzegorz A Rempala Yuhong Yang

We consider two popular, permutation-based, step-down procedures of p-values adjustment in multiple testing problems known as min P and max T and intended for strong control of the family-wise error rate, under the so-called subset pivotality property (SPP). We examine key but subtle issues involved in ascertaining validity of these methods, and also introduce a new, slightly narrower notion of...

2009
Michel Chein Marie-Laure Mugnier

Bring home now the book enPDFd graph based knowledge representation computational foundations of conceptual graphs to be your sources when going to read. It can be your new collection to not only display in your racks but also be the one that can help you fining the best sources. As in common, book is the window to get in the world and you can open the world easily. These wise words are really ...

2000
John F. Sowa

Bring home now the book enPDFd knowledge representation logical philosophical and computational foundations to be your sources when going to read. It can be your new collection to not only display in your racks but also be the one that can help you fining the best sources. As in common, book is the window to get in the world and you can open the world easily. These wise words are really familia...

2012
Ramaswamy Chandramouli

Smart cards are now being extensively deployed for identity verification(smart identity tokens) for controlling access to Information Technology (IT) resources as well as physical resources. Depending upon the sensitivity of the resources and the risk of wrong identification, different authentication use cases are being deployed. Assignment of authentication strength for each of the use cases i...

Journal: :Studi e saggi 2021

The essay examines the travel photo-text genre from a theoretical point of view, through example Absolutely Nothing by Giorgio Vasta and Ramak Fazel. It discusses key issues perspectives within theory methodology visual studies culture describes opposition between verbal parts volume, understood as “Struggle for Territory”. This puts on strain foundations story tradition, such narrative authent...

2016
Youngseok Chung Seokjin Choi Youngsook Lee Namje Park Dongho Won

More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them revea...

2001
Roland Hausser

Bring home now the book enPDFd foundations of computational linguistics human computer communication in natural language to be your sources when going to read. It can be your new collection to not only display in your racks but also be the one that can help you fining the best sources. As in common, book is the window to get in the world and you can open the world easily. These wise words are r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید