نتایج جستجو برای: unilateral authentication
تعداد نتایج: 74220 فیلتر نتایج به سال:
conclusions the current study showed that poorness and unreliability of “al-kafi” narratives is a vain thought. hence, it is recommended to perform clinical trial studies (at least) on accurate/authentic narratives, and also consider them as reputable and valid narratives, along with traditional medicine references. results from all narratives of the book “al-kafi” (pillars, furoo, and rouzat a...
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
Mobile IPv6 (MIPv6) is one key protocol for IPv6 enabled computers and handsets providing always-on capabilities and seamless mobility between wireless and wired networks. Binding Update protocol, which has resolved the triangle routing problem in MIPv6, was fraught with vulnerabilities due to mobility. In this paper, we presented three typical lightweight unilateral authentication protocols fo...
Security enhancements to the Internet are often implemented as hierarchical and centralizing structures grafted onto what is fundamentally a decentralized design. Hierarchical structures, such as DNSSEC and RPKI, provide a convenient way to enforce consistency and prevent important categories of security violations. They also provide a locus of control for trusted authorities who have access to...
Classically, it has been assumed that visual space can be represented by a metric. This means that the distance between points and the angle between lines can be uniquely defined. However, this assumption has never been tested. Also, measurements outdoors, where monocular cues are abundant, conflict with this model. This paper reports on two experiments in which the structure of visual space wa...
There is a long-running debate over the extent to which volitional attention can modulate the appearance of visual stimuli. Here we use monocular rivalry between afterimages to explore the effects of attention on the contents of visual experience. In three experiments, we demonstrate that attended afterimages are seen for longer periods, on average, than unattended afterimages. This occurs both...
What do you do to start reading surgery in solitary kidney and corrections of urinary transport disturbances? Searching the book that you love to read first or find an interesting book that will make you want to read? Everybody has difference with their reason of reading a book. Actuary, reading habit must be from earlier. Many people may be love to read, but not a book. It's not fault. Someone...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Monocular zones adjacent to depth steps can create an impression of depth in the absence of binocular disparity. However, the magnitude of depth is not specified. We designed a stereogram that provides information about depth magnitude but which has no disparity. The effect depends on transparency rather than occlusion. For most subjects, depth magnitude produced by monocular transparency was s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید