نتایج جستجو برای: bilateral authentication

تعداد نتایج: 117646  

Journal: :iranian journal of blood and cancer 0
kourosh goudarzi pour peyman eshghi roxana aghakhani alireza askari parisa nejat mahmud

neuroblastoma is a common tumor in pediatric cancer and which might present with usual or unusual clinical features. one of the rare clinical finding of neuroblastoma is paraneoplastic syndromes. we report a two year-old girl with presentation of bilateral ptosis and abdominal pain which was diagnosed as having neuroblastoma. our case is a very rare case of neuroblastoma accompanied by bilatera...

H. Nasiraee M. Ashouri-Talouki,

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

Journal: :quran and medicine 0
reza ilkhani research deputy of traditional medicine, tehran university of medical sciences, tehran, ir iran; research deputy of traditional medicine, tehran university of medical sciences, tehran, ir iran. tel: +98-2133364238 zohreh ghazimoradi research deputy of traditional medicine, tehran university of medical sciences, tehran, ir iran

conclusions the current study showed that poorness and unreliability of “al-kafi” narratives is a vain thought. hence, it is recommended to perform clinical trial studies (at least) on accurate/authentic narratives, and also consider them as reputable and valid narratives, along with traditional medicine references. results from all narratives of the book “al-kafi” (pillars, furoo, and rouzat a...

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

Journal: :the archives of bone and joint surgery 0
harshad shah ms ramaiah medical college, bangalore, karnataka ,india amit grover ms ramaiah medical college, bangalore, karnataka ,india daksh gadi ms ramaiah medical college, bangalore, karnataka ,india sudarshan k ms ramaiah medical college, bangalore, karnataka ,india

hip fractures are one of the most common injuries which present to an orthopaedic surgeon. most of these cases are unilateral .bilateral simultaneous femur neck fracture is a rare occurrence. we report a case of a bilateral neck femur fracture in a 30 year male following a generalized tonic clonic seizure in view of its rarity and also to increase the awareness of such rare injuries. the patien...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :IACR Cryptology ePrint Archive 2017
Papa B. Seye Augustin P. Sarr

The security models for Authenticated Key Exchange do not consider leakages on pre–computed ephemeral data before their use in sessions. We investigate the consequences of such leakages and point out damaging consequences. As an illustration, we show the HMQV–C protocol vulnerable to a Bilateral Unknown Key Share (BUKS) and an Unilateral Unknown Key Share (UUKS) Attack, when precomputed ephemer...

F. Naji Mohades M. H. Yaghmaee Moghadam

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید