• Nenhum resultado encontrado

[PDF] Top 20 Survey: Study on Authentication used in Internet Cryptography

Has 10000 "Survey: Study on Authentication used in Internet Cryptography" found on our website. Below are the top 20 most common "Survey: Study on Authentication used in Internet Cryptography".

Survey: Study on Authentication used in Internet Cryptography

Survey: Study on Authentication used in Internet Cryptography

... locally on the clients or they may be distributed by using a key distribution ...host authentication takes place using the transport layer ...Kerberos authentication was developed at the ... See full document

9

The Impact of E-Commerce Securi ty, and National Environment  on Consumer adoption of Intern et Banking in Malaysia and  Singapore

The Impact of E-Commerce Securi ty, and National Environment on Consumer adoption of Intern et Banking in Malaysia and Singapore

... displayed on its web site, compared to most other Malaysia banks that do not have or display such web assurance seal in their web ...surveyed used MayBank for their Internet banking ... See full document

20

Prevalence and characteristics of chronic pain in Brazil: a national internet-based survey study

Prevalence and characteristics of chronic pain in Brazil: a national internet-based survey study

... living in the different geographical regions of the ...participants used the internet to answer the ...focus on the relationship between CP and the climate or environmental situation in ... See full document

8

Anacleto Cortez e Correia

Anacleto Cortez e Correia

... design, in addition to syntax error verification, which is available to a certain degree from current tools, the modelers would have also, real-time checking about seman- tic violations in models ... See full document

352

The friction influence on stress in micro extrusion

The friction influence on stress in micro extrusion

... The wave model reveals increase of friction shear factor m values at the interface in micro scale. Its presence affects the level of extrusion forces. The higher wave height while the same process, requires the ... See full document

4

A technology diffusion perspective of Enterprise Resource Planning across European Small and Medium Enterprises: from determinants to Use to Value

A technology diffusion perspective of Enterprise Resource Planning across European Small and Medium Enterprises: from determinants to Use to Value

... lens. In this way help to reduce the many identified mismatches in packaged software ...focusing on SMEs would fill an important void in the packaged software literature, which has tended to ... See full document

159

What's begin used at home: a household pesticide survey

What's begin used at home: a household pesticide survey

... and used themselves, but is cur- rently banned by the EPA for sale and use within the United ...product in the United States, with most of them saying they purchased it at a neighborhood store that ... See full document

7

HIV awareness in Pakistan: A survey-based study

HIV awareness in Pakistan: A survey-based study

... depends on the age of the person that when he/she acquired infection. In addition, modern therapies have increased the life span of the infected person and even the life expectancy of the population ... See full document

4

A Study on Preference of Interface Design Techniques for Web Survey

A Study on Preference of Interface Design Techniques for Web Survey

... advancement in internet and web-based application, the survey via the internet has been increasingly ...that internet survey could access to respondents with no limitation ... See full document

8

A REVIEW ON ELLIPTIC CURVE CRYPTOGRAPHY  FOR EMBEDDED SYSTEMS

A REVIEW ON ELLIPTIC CURVE CRYPTOGRAPHY FOR EMBEDDED SYSTEMS

... both in hardware and software as it is capable to speed up the modular multiplication process by five times ...M. In the Montgomery algorithm, the multiple of the modulus M that is added to A·B is chosen ... See full document

20

INVOLUTORY MATRIX IN VISUAL CRYPTOGRAPHY

INVOLUTORY MATRIX IN VISUAL CRYPTOGRAPHY

... factors in examining the encrypted image is the visual inspection where the higher the disappearance of the main features is, the better the encryption algorithm will ...depending on the visual inspection ... See full document

5

A study on anti-diabetic and anti-hypertension herbs used in Lorestan province, Iran

A study on anti-diabetic and anti-hypertension herbs used in Lorestan province, Iran

... been used for reducing blood lipids, increasing appetite, stomach and liver tonic in traditional medicine and is known to be beneficial in liver disorders and kidney stones ...Dill in ... See full document

6

Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol

Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol

... of authentication was presented [22]. That mechanism was built on layer two, Point-to-Point Protocol (PPP) ...[23]. Authentication is achieved when building new Request For Comments (RFCs) [24] for ... See full document

8

A Survey on Infertility in Royan Institute

A Survey on Infertility in Royan Institute

... Results: In this study, the frequency of primary and secondary infertility was 90.1% and 9.9%, respectively. Among 2492 couples, 50.5% had male factor, 28.6% had female factor, 11.6% had both male and ... See full document

4

J. bras. pneumol.  vol.36 número6 en v36n6a03

J. bras. pneumol. vol.36 número6 en v36n6a03

... The data collected (6,500 records) were transcribed into a database by optical reading. Data analysis was performed with the Statistical Package for the Social Sciences, version 12.0 (SPSS Inc., Chicago, IL, USA), and ... See full document

10

Rev. bras. epidemiol.  vol.14 suppl.1 en a02v14s1

Rev. bras. epidemiol. vol.14 suppl.1 en a02v14s1

... have on such estimates, and in order to measure the differences between the population excluded from the sample (those who do not possess a telephone) and the ones who were included in the sample ... See full document

11

PDF EN Jornal Brasileiro de Pneumologia 6 3 english

PDF EN Jornal Brasileiro de Pneumologia 6 3 english

... Objective: To identify the factors associated with smoking experimentation and initiation among adolescent students (11-14 years of age). Methods: A cross-sectional, population-based study involving adolescent ... See full document

9

Rev. bras. linguist. apl.  vol.12 número2

Rev. bras. linguist. apl. vol.12 número2

... policy in the English Studies department, nor is there a legacy of teaching varieties of ...like in other contexts, ELT is supported by materials, resources and publications from Inner Circle ...countries. ... See full document

25

Fabrication of in situ composite layer on cast steel

Fabrication of in situ composite layer on cast steel

... The study describes the technology of fabrication of composite layers in cast steel reinforced with titanium ...carbides. In the process under discussion, the reinforcing TiC phase is formed ... See full document

6

Arq. NeuroPsiquiatr.  vol.70 número2

Arq. NeuroPsiquiatr. vol.70 número2

... founded in Rosario, Argentina, in October, 2003 by Latin-American profession- als, with special interest and dedication to neurocritical ill ...fessionals in the ield of neurointensive care, thus ... See full document

6

Show all 10000 documents...