نتایج جستجو برای: exchange property

تعداد نتایج: 344843  

Journal: :Informatica, Lith. Acad. Sci. 2010
Yuh-Min Tseng Tsu-Yang Wu

In 2008, based on the two-party Diffie–Hellman technique, Biswas proposed a contributory group key exchange protocol called the Group-DH protocol. This contributory property is an important one of group key agreement. Unfortunately, in this paper we show that the proposed Group-DH protocol is not a contributory group key exchange protocol. Therefore, we propose an improved group key exchange pr...

2010
Xinyi Huang Yi Mu Willy Susilo Wei Wu Yang Xiang

Recent research has shown that the single-user security of optimistic fair exchange cannot guarantee the multi-user security. This paper investigates the conditions under which the security of optimistic fair exchange in the single-user setting is preserved in the multi-user setting. We first introduce and define a property called “Strong ResolutionAmbiguity”. Then we prove that in the certifie...

2014
Anthea P Amadi-Echendu René Pellissier

Customer valuations are not just about service quality but also process efficiency. As a result organisations need to continuously reassess their business processes in order to improve their operations and service delivery to their customers. Conveyancing deals with the exchange of immovable property. Although conveyancing processes are wider in context than conventional organisational-level bu...

Hossein Faghihian Mohammad Hadi Mohammadi

Nitrate is an anion of major importance particularly in biological areas. Excessive amounts in water supplies indicate pollution from sewage or agricultural effluents. The effects of excessive quantities of nitrate in water are well known. In this research structural modification of natural clinoptilolite by isomorphic substitution was performed. Isomorphously substituted zeolite was prepar...

Journal: :IACR Cryptology ePrint Archive 2005
Robert W. Zhu Xiaojian Tian Duncan S. Wong

In 2001, Canetti and Krawczyk proposed a security model (CKmodel) for authentication protocols. They also gave an indistinguishabilitybased definition for key exchange protocols. Since then the model has almost exclusively been used for analyzing key exchange protocols, although it can be applied to authentication protocols in general. The model not only captures a large class of attacks but al...

Journal: :International Journal of Engineering & Technology 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید