نتایج جستجو برای: bilateral authentication

تعداد نتایج: 117646  

Journal: :iranian journal of allergy, asthma and immunology 0
abolhassan farhoudi zahra chavoshzadeh bahram mir saeid ghazi asghar aghamohammadi mohammad gharagozlou

cd8 deficiency is a rare primary immunodeficiency with low or absent peripheral cd8 cells which results from tap deficiency, zap 70 deficiency and cd8 α gene mutation. we report a 14 year old female who presented with a history of recurrent pneumonia, bronchiectasis, otitis, severe varicella, herpetic lesions of mouth, bilateral uveitis, and cataract formation since the age of 8 years. she had ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1386

چکیده ندارد.

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

2013
Poonam Jindal Brahmjit Singh

Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communication. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Analyzing QoS and security impact of authentication, therefore, becomes critical to developing efficient authentication schemes. In this paper, we propose a sy...

2011
Lars Strand Wolfgang Leister Alan Duric

This paper specifies a two-step migration towards a stronger authentication in the Session Initiation Protocol. First, we add support for a Password Authenticated Key Exchange algorithm that can function as a drop-in replacement for the widely adopted Digest Access Authentication mechanism. This new authentication mechanism adds support for mutual authentication, is considered stronger and can ...

2002
Adam Hess Jared Jacobson Hyrum Mills Ryan Wamsley Kent E. Seamons Bryan Smith

Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approaches based on identity or capabilities do not solve the problem of establishing trust between strangers. New approaches to trust establishment are required that are secure, scalable, and portable. One new approach to m...

N Kahkeshani, A Hadjiakhoondi , M Khanavi ,

Background: Nepeta menthoides Boiss & Buhse is a species from Lamiaceae family. It is used as a herbal medicine with common name “Ostokhodus” in Iranian traditional and folk medicine but there is not enough information about its quality and quantity control methods. Objective: In this study we use micromorphological and phytochemical evaluations for qualitative and quantitative control of N. ...

This paper proposed an authentication system based on low quality palmprint. For implementation of this system, first the features is extracted by using Contourlet and wavelet transforms. In the second phase, some of the features are selected by using Across Group Variance (AGV) filter. In the last phase by using a classification method, the authentication is completed. For classification we ev...

2012
HongIl Ju JongWook Han

In this paper we describes the authentication for DHCP (Dynamic Host Configuration Protocol) message which provides the efficient key management and reduces the danger replay attack without an additional packet for a replay attack. And the authentication for DHCP message supports mutual authentication and provides both entity authentication and message authentication. We applied the authenticat...

Journal: :بینا 0
فرید کریمیان f karimian تهران- پاسداران- بوستان نهم- بیمارستان لبافی نژاد- مرکز تحقیقات چشم محمدعلی جوادی ma javadi تهران- پاسداران- بوستان نهم- بیمارستان لبافی نژاد- مرکز تحقیقات چشم روشنک نظری r nazari تهران- پاسداران- بوستان نهم- بیمارستان لبافی نژاد- مرکز تحقیقات چشم حسین محمدربیع h mohammad rabei تهران- پاسداران- بوستان نهم- بیمارستان لبافی نژاد- مرکز تحقیقات چشم محمدرضا جعفری نسب mr jafarinasab تهران- پاسداران- بوستان نهم- بیمارستان لبافی نژاد- مرکز تحقیقات چشم

purpose: to report two cases of bilateral bacterial keratitis as a sight-threatening complication following photorefractive keratectomy (prk) patients and findings: the first case was a 45-year-old man referred due to bilateral ocular pain and purulent discharge two days after bilateral prk. based on his clinical picture, smear and cultures from both corneal ulcers were taken with a diagnosis o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید