تیموریان: تألیف پروفسور اسماعیل آکا (ismail aka, timurlular, ankara, turkiye diyanet vakfi, 1995)
پایان نامه
- وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده ادبیات و علوم انسانی
- نویسنده اکبر صبوری
- استاد راهنما اللهیار خلعتبری محمدتقی امامی
- تعداد صفحات: ۱۵ صفحه ی اول
- سال انتشار 1387
چکیده
چکیده ندارد.
منابع مشابه
Femtocell Networks Ismail Guvenc
Femtocells are small cellular base stations that may be deployed in residential, enterprise, or outdoor areas. They utilize the available broadband connections of the users (e.g., cable or DSL) and typically have a coverage radius on the order of ten meters or more. Due to their various advantages, recently there has been a growing interest in femtocell networks both in academia and in industry...
متن کاملEAP AKA Authentication January 2003 The introduction of AKA inside
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...
متن کاملInternet - Draft EAP - AKA
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP-AKA includes optional identity privac...
متن کاملRfc 5448 Eap - Aka
This specification defines a new EAP method, EAP-AKA’, which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation ...
متن کاملEAP AKA Authentication
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP AKA includes optional identity privac...
متن کاملInternet - Draft EAP - AKA ’ September
This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs SHA-256 instead of ...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
نوع سند: پایان نامه
وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده ادبیات و علوم انسانی
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023