نتایج جستجو برای: chen et al2005

تعداد نتایج: 512086  

Journal: :JNW 2010
Qi Xie Deren Chen

To use the network services provided by multiple servers in mobile wireless network, recently, Tsai proposed a hash function and smart card based multi-server authentication protocol. Chen et al. showed that Tsai’s scheme cannot resist the server spoofing attack, and proposed a novel one. In this paper, we show that Chen et al.’s protocol cannot resist off-line password guessing attacks, and pr...

Journal: :iranian journal of medical sciences 0
a. kiani department of pediatrics cardiology, day hospital, tehran, iran j. gilani shakibi department of pediatrics cardiology, day hospital, tehran, iran

background: in certain conditions, there is a need for a specific and improved measure of cardiac performance.  routine methods for assessing left ventricular (lv) function are based on image-analysis or right heart monitoring which do not allow evaluation of ventriculo-arterial interaction. chen et al presented a noninvasive method allowing measurement of end-systolic pressure–volume relation ...

Journal: :Clinical Infectious Diseases 2013

‎A rank equality is established for the sum of finitely many tripotent matrices via elementary block matrix operations‎. ‎Moreover‎, ‎by using this equality and Theorems 8 and 10 in [Chen M‎. ‎and et al‎. ‎On the open problem related to rank equalities for the sum of finitely many idempotent matrices and its applications‎, ‎The Scientific World Journal 2014 (2014)‎, ‎Article ID 702413‎, ‎7 page...

Journal: :The Journal of Infectious Diseases 2008

Journal: :I. J. Bifurcation and Chaos 2013
Zeraoulia Elhadj Julien Clinton Sprott

In many situations, the existence of several equilibrium points in a dynamical system makes its dynamics more complex and allows some special structures. Examples include the well-known multiscroll attractors ([Wang, 2009; Qi et al., 2008; Liu & Chen, 2004; Li, 2008; Wang et al., 2009; Lü et al., 2008; Yu et al., 2006; Yu et al., 2008, 2010a; Wang & Chen, 2012] and references therein) such as c...

2008
Jin-Hong Kim Rae-Hong Park

Recognizing action is an important part of a video surveillance and video retrieval system, in which motion information extracted from video is useful. This paper proposes an action synthesis method, in which Efros et al.’s action recognition method, Chen et al.’s body segmentation method, and Fujiyosi et al.’s method are combined. Chen et al.’s method and Fujiyosi et al.’s method are used as p...

Journal: :Informatica, Lith. Acad. Sci. 2007
Pei-Hui Huang Hsiang-An Wen Chih-Hung Wang Tzonelih Hwang

Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can produce a valid signature as the proxy signer does in the proxy protected scheme. Therefore, Chen et al.’s proxy-protected scheme cannot protect the proxy signer from being forged by the original signers. We further f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید