نتایج جستجو برای: protocol

تعداد نتایج: 250013  

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

Fatemeh Baghernejad Masoumeh Safkhani, Nasour Bagheri

In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

Journal: :asian journal of sports medicine 0
seyed farzad mohammadi eye research center, farabi eye hospital, tehran university of medical sciences, tehran, ir iran; center for non-communicable diseases control, ministry of health and medical education, tehran, ir iran mohammad aghazade amiri deptartment of optometry, faculty of rehabilitation sciences, shahid beheshti university of medical sciences, tehran, ir iran homa naderifar eye research center, farabi eye hospital, tehran university of medical sciences, tehran, ir iran elham rakhshi eye research center, farabi eye hospital, tehran university of medical sciences, tehran, ir iran; eye research center, farabi eye hospital, tehran university of medical sciences, karegar street, qazvin square, tehran, ir iran. tel: +98-2155416134, fax: +98-2155409092 banafsheh vakilian eye research center, farabi eye hospital, tehran university of medical sciences, tehran, ir iran elham ashrafi eye research center, farabi eye hospital, tehran university of medical sciences, tehran, ir iran

introduction visual skills are one of the main pillars of intangible faculties of athletes that can influence their performance. great number of vision tests used to assess the visual skills and it will be irrational to perform all vision tests for every sport. objectives the purpose of this protocol article is to present a relatively comprehensive battery of tests and assessments on static and...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور 1389

چکیده ندارد.

A. Zaghian M. J. Hashemi

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

Arash Samiei Azadeh Fazel Batool Rashidi Ensieh Shahrokh Tehraninejad, Kiandokht Kiani

Background To compare a flexible, multi-dose GnRH antagonist protocol with a long GnRH .agonist protocol in poor respo MaterialsAndMethods A randomized clinical trial of 70 poor responder patients (35 patients in GnRH antagonist protocol and 35 patients in long GnRH agonist protocol) was performed at Royan Institute, Tehran, Iran. Both groups were given a fixed dose of human menopausal gonadotr...

Journal: :physiology and pharmacology 0
shoeib rezaee dept. physiotherapy, school of medical sciences, tarbiat modares university, tehran, iran. sedighe kahrizi dept. physiotherapy, school of medical sciences, tarbiat modares university, tehran, iran. mehdi hedayati prevention &treatment of obesity research institute for endocrine sciences, shahid beheshti university of medical sciences,tehran,iran

introduction: this research was aimed at examining acute responses of hormones such as growth hormone (gh), total testosterone (tt), free testosterone (ft), free fatty acid (ffa) and cortisol to resistance (r), endurance (e) and endurance-resistance (er) exercise. methods: the participants of this study were 10 healthy young men. r protocol included bench press, lateral pull down, leg extension...

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

Introduction: This research was aimed at examining acute responses of hormones such as growth hormone (GH), total testosterone (TT), free testosterone (FT), free fatty acid (FFA) and cortisol to resistance (R), endurance (E) and endurance-resistance (ER) exercise. Methods: The participants of this study were 10 healthy young men. R protocol included bench press, lateral pull down, leg exten...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید