نتایج جستجو برای: bilateral authentication
تعداد نتایج: 117646 فیلتر نتایج به سال:
cd8 deficiency is a rare primary immunodeficiency with low or absent peripheral cd8 cells which results from tap deficiency, zap 70 deficiency and cd8 α gene mutation. we report a 14 year old female who presented with a history of recurrent pneumonia, bronchiectasis, otitis, severe varicella, herpetic lesions of mouth, bilateral uveitis, and cataract formation since the age of 8 years. she had ...
چکیده ندارد.
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communication. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Analyzing QoS and security impact of authentication, therefore, becomes critical to developing efficient authentication schemes. In this paper, we propose a sy...
This paper specifies a two-step migration towards a stronger authentication in the Session Initiation Protocol. First, we add support for a Password Authenticated Key Exchange algorithm that can function as a drop-in replacement for the widely adopted Digest Access Authentication mechanism. This new authentication mechanism adds support for mutual authentication, is considered stronger and can ...
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. New approaches to trust establishment are required that are secure, scalable, and portable. One new approach to m...
Background: Nepeta menthoides Boiss & Buhse is a species from Lamiaceae family. It is used as a herbal medicine with common name “Ostokhodus” in Iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. Objective: In this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of N. ...
This paper proposed an authentication system based on low quality palmprint. For implementation of this system, first the features is extracted by using Contourlet and wavelet transforms. In the second phase, some of the features are selected by using Across Group Variance (AGV) filter. In the last phase by using a classification method, the authentication is completed. For classification we ev...
In this paper we describes the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and message authentication. We applied the authenticat...
purpose: to report two cases of bilateral bacterial keratitis as a sight-threatening complication following photorefractive keratectomy (prk) patients and findings: the first case was a 45-year-old man referred due to bilateral ocular pain and purulent discharge two days after bilateral prk. based on his clinical picture, smear and cultures from both corneal ulcers were taken with a diagnosis o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید