نتایج جستجو برای: wise foundations authentication

تعداد نتایج: 90938  

Journal: :Statistics in medicine 2015
Zhiying Qiu Wenge Guo Gavin Lynch

Testing a sequence of pre-ordered hypotheses to decide which of these can be rejected or accepted while controlling the familywise error rate (FWER) is of importance in many scientific studies such as clinical trials. In this paper, we first introduce a generalized fixed sequence procedure whose critical values are defined by using a function of the numbers of rejections and acceptances, and wh...

2012
Ch. Krishna Prasad Raja Sekhar

–Mission-Critical networks show great potential in assisted living system, automotive networks, emergency rescue and disaster recovery system, military applications, critical infrastructure monitoring system. To build a secure communication system in that network, usually the first attempt is to employ cryptographic keys. Cryptographic key management is challenging due to the things like unreli...

2004
Katherine S. Pollard Sandrine Dudoit Mark J. van der Laan

2 Methods 5 2.1 Multiple hypothesis testing framework . . . . . . . . . . . . . 5 2.2 Test statistics null distribution . . . . . . . . . . . . . . . . . 11 2.3 Single-step procedures for control of general Type I error rates θ(FVn) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.4 Step-down procedures for control of the family-wise error rate 16 2.5 Augmentation multiple tes...

Journal: :Biometrics 2010
Ajit C Tamhane Cyrus R Mehta Lingyun Liu

We consider a clinical trial with a primary and a secondary endpoint where the secondary endpoint is tested only if the primary endpoint is significant. The trial uses a group sequential procedure with two stages. The familywise error rate (FWER) of falsely concluding significance on either endpoint is to be controlled at a nominal level α. The type I error rate for the primary endpoint is cont...

Journal: :SSRN Electronic Journal 2009

Journal: :پژوهش های فقهی 0
محمد کرمی دانشجوی دکتری دانشگاه فردوسی مشهد محمدتقی قبولی درافشان دانشیار دانشگاه فردوسی مشهد حسین ناصری مقدم دانشیار دانشگاه فردوسی مشهد

one of the most important sources of imamiyyah jurisprudence is the tradition in the form of reliable report. and a significant part of it, refers to external threads, but the renowned osuli's jurisprudents take the view that the scope of the reliable authority credit, is limited to injunctions and argue that account is a subject concerning with evidence chapter in which justice and witnes...

Journal: :International Journal of Information Security 2022

Abstract Passwordless authentication is a trending theme in cyber security, while biometrics gradually replace knowledge-based schemes. However, Personal Identification Numbers, passcodes, and graphical passwords are still considered as the primary means for authentication. Passwords must be memorable to usable; therefore, users tend choose easy guess secrets, compromising security. The Android...

Journal: :Information Security Journal: A Global Perspective 2012
Syed Akram Mohammed Misbahuddin G. Varaprasad

This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date...

The Internet of Things (IoT), is a new concept that its emergence has caused ubiquity of sensors in the human life. All data are collected, processed, and transmitted by these sensors. As the number of sensors increases,   the first challenge in establishing a secure connection is authentication between sensors. Anonymity, lightweight, and trust between entities are other main issues that shoul...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید