نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

Journal: Money and Economy 2013
Asadollah Shahbahrami, Mohsen Ebadi Jokandan,

In order to provide different services for the customers, banks embark on a multimedia contact center. Considering that, in this center, where several services such as transferring money, getting statement information and asking for check books are provided, the authentication is of high importance. How to allocate the appropriate authentication method for each customer is one of the challe...

2012
Dan Boneh Mark Zhandry

We construct the first Message Authentication Codes (MACs) that are existentially unforgeable against a quantum chosen message attack. These chosen message attacks model a quantum adversary’s ability to obtain the MAC on a superposition of messages of its choice. We begin by showing that a quantum secure PRF is sufficient for constructing a quantum secure MAC, a fact that is considerably harder...

2005
L. Finos

This work proposes innovative permutation-based procedures controlling the Familywise Error rate (FWE). It is proofed that weighted procedures control the FWE if weights are a function of the sufficient statistic. Particularly, we focus on the use of the additional information given by the total variance of each variables. The first proposal considers the use of weights applied to the combining...

1999
S. Fajfer S. Prelovšek P. Singer

We propose the B c → B * u γ decay as the most suitable probe for the flavour changing neutral transition c → uγ. We estimate the short and long distance contributions to this decay within the standard model and we find them to be comparable; this is in contrast to radia-tive decays of D mesons, that are completely dominated by the long distance contributions. Since the c → uγ transition is ver...

2013
Mohammad Mahmoody

Cryptography is the science of secure computation and communication. The scope of cryptosystems, nowadays, ranges from private-key encryption and authentication to more complex systems such as publickey encryption, electronic voting, secure multi-party computation on large data sets, etc. My specialization is in foundations of cryptography, a field that aims at designing cryptographic protocols...

2016
Michael Grabatin Wolfgang Hommel Stefan Metzger Daniela Pöhn

Access to remote IT services through identity federations (IFs) has solid technical foundations such as the Security Assertion Markup Language (SAML). However, reliable delegated user authentication and authorization also pose organizational challenges regarding the quality management of user data. Level of Assurance (LoA) concepts have been adapted and applied to IFs, but their inhomogeneous p...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

Journal: :Journal of statistical planning and inference 2014
Jay Bartroff Jinlin Song

This paper addresses the following general scenario: A scientist wishes to perform a battery of experiments, each generating a sequential stream of data, to investigate some phenomenon. The scientist would like to control the overall error rate in order to draw statistically-valid conclusions from each experiment, while being as efficient as possible. The between-stream data may differ in distr...

2009
Tyrone Duncan David Nualart

In this paper we establish the existence of path-wise solutions and the uniqueness in law for multidimensional stochastic differential equations driven by a multi-dimensional fractional Brownian motion with Hurst parameter H > 12 .

2012
Oh-Jin Kwon Won-Gyu Kim Youngseop Kim

We propose a watermarking scheme for the authentication of binary images. We transform the image using the binary wavelet transform and partition the resulting coefficients into treestructured blocks. The size of each block is decided by the number of flippable coefficients in the block. The flippable coefficients are found in the frequency domain by investigating high frequency coefficients. A...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید