نتایج جستجو برای: the man

تعداد نتایج: 16069788  

2006
Stan Jarzabek

In this Chapter, we further highlight the difficulties to combat the problems of change with conventional techniques, in view of maintenance and evolution challenges discussed in Chapter 1. We also briefly preview some of the remedies to fight these problems using unconventional approaches. With emphasis on complexity inherent in software, we focus on the following problems: Poor visibility of ...

Journal: :Des. Codes Cryptography 2007
Alexandre Pinto André Souto Armando Matos Luis Filipe Coelho Antunes

In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, by Blundo et al, 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an auth...

1995
Kaoru Kurosawa Satoshi Obana

Unconditionally secure authentication codes with arbitration (A 2 -codes) protect against deceptions from the transmitter and the receiver as well as that from the opponent. In this paper, we present combinatorial lower bounds on the cheating probabilities for A 2 -codes in terms of the number of source states, that of the whole messages and that of messages which the receiver accepts as authen...

2015
Ashish Kumar

.................................................................................. iii TABLE OF CONTENTS................................................................... iv LIST OF FIGURES......................................................................... vii LIST OF TABLES........................................................................... viii

2016
Steve Blumenthal

Last week we looked at structural issues. Specifically, the oversupply glut of 3 billion workers competing for the work that 800 million workers were doing before the internet opened the world to the emerging market supply chain. Think China’s massive infrastructure build out – the excess manufacturing and labor capabilities and also think about Korea, Singapore, Taiwan and India. Fifteen dolla...

Journal: :I. J. Network Security 2008
Min-Ho Kim Çetin Kaya Koç

Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-Kiselev scheme is insecure against the man-in-the-middle attack. In this article, we propose an improved version of the Novikov-Kiselev scheme to overcome such vulnerability.

Journal: :IEEE Pervasive Computing 2008
Roy Want

W hen I hear the phrase “humanimplantable electronics,” I must confess that I feel a bit queasy. It conjures up a more extreme image of pervasive computing than is usually justified. However, my perspective is that of a relatively healthy person in his 40s, without any physical handicaps. If my hearing was impaired or my heartbeat arrhythmic, I might be keen to find a remedy—and, at this time, ...

2007
D. C. Braun

We present time-distance analyses of several active regions and a region of quiet Sun observed with the Global Oscillation Network Group (GONG). Analyzing temporal correlations between the p-mode oscillation signal observed within the sunspots with the signals integrated within surrounding annuli, we connrm the recent nding of Duvall and his colleagues that travel times (+) for outward propagat...

Journal: :I. J. Network Security 2016
Mohamad Badra Sherali Zeadally

Recent advances in hardware, software, computing, and communication technologies have enabled the design and deployment of a smarter, interactive, dynamic 21st century electrical grid, also known as the smart grid. The bi-directional flow of information between the customer premise and the utility provider opens up several privacy challenges that must be addressed. We describe possible man-in-t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید