-
381
À propos de la découverte d’un dictionnaire inédit du xviiie siècle
Published 2013-11-01Get full text
Article -
382
Portraits de Résistantes (1847-1875) : la femme face au système patriarcal dans quelques romans victoriens
Published 2012-06-01Get full text
Article -
383
Order extension of order monomorphisms on a preordered topological space
Published 1993-01-01Get full text
Article -
384
CAPITALIZATION OF RELATIONS IN THE CONTEXT OF VALUE MANAGEMENT
Published 2016-09-01Get full text
Article -
385
Cyril of Alexandria speaks for God in his interpretation of the Holy Bible
Published 2014-06-01Get full text
Article -
386
Paremiologia na warsztacie leksykografa. W stronę słownika przyjaznego odbiorcy
Published 2018-06-01Get full text
Article -
387
Sensing-Based Spectrum Sharing Method in Satellite-Terrestrial Network
Published 2021-12-01“…Considering the spatial possibility of opportunistic spectrum sharing, sensing-based spectrum sharing method ws applied in the satellite-terrestrial network.The sensing-throughput tradeoff problem was studied, and the throughput is a concave function of the sensing duration was proved.In order to further improved the satellite uplink throughput, the multi-slots sensing method and the cooperative sensing method were proposed.Computer simulations showed that the optimal sensing duration could maximized the uplink throughput, and the multi-slot sensing method or the cooperative sensing method could further improved the throughput of satellite network.…”
Get full text
Article -
388
Mechanism of Strain Burst by Laboratory and Numerical Analysis
Published 2018-01-01Get full text
Article -
389
CHARACTERISTICS OF THE PERSONAL IDENTITY OF DESIGN STUDENTS AT DIFFERENT STAGES OF TRAINING IN HIGH SCHOOL
Published 2015-06-01Get full text
Article -
390
-
391
Analiza ispunjenosti uslova za mernu nesigurnost sistema za kontrolu pametnih brojila i smanjenje vremena provere registra
Published 2024-06-01“…Prvi cilj ovog rada je da se proveri da li je ovaj prvi uslov najkritičniji za cosφ=0,25 induktivno ili cosφ=0,5 kapacitivno, koji se zadaju na poseban zahtev korisnika brojila. …”
Get full text
Article -
392
-
393
Gevrey Regularity for the Noncutoff Nonlinear Homogeneous Boltzmann Equation with Strong Singularity
Published 2014-01-01Get full text
Article -
394
New remote authorization protocol for vehicle diagnosis
Published 2014-11-01“…The authorization of diagnosis principals is a critical problem in the remote fault diagnosis of vehicles.Considering the defects of the previous authorization protocol for the remote diagnosis,i.e.PVAUDS,a novel authorization protocol is proposed,named PVAUDS+.In addition to the enforcement on the security properties of PVAUDS,the bidirectional authentication and the freshness of authorization tickets for the diagnosis principals are provided.The resistance of Denial-of-Service (DoS) attack for the trusted third party is also provided.The proposed security targets are achieved through the cost increasing of requests for the resistance of DoS attack,the automatic proof of security properties with the ProVerif tool.The results of quantitative analysis show proposed protocol is practical for use.…”
Get full text
Article -
395
-
396
Amharic Folkloric Oral Traditions: Collections for Insiders and for Outsiders
Published 2023-03-01Get full text
Article -
397
Demographics and the Irony of Existential Profiling in Yorùbá Thought: Policy Considerations for Nigeria
Published 2021-12-01Get full text
Article -
398
Study on enhancing integrity for BLP model
Published 2010-01-01“…A model which enhances the integrity of BLP model was presented based on the BLP model.This model was called as EIBLP model.Some necessary restraints to upward information flow were appended in EIBLP without chang-ing the information flow direction(down-read and up-write) of BLP model and the security axiom,access labels of sub-ject and object,access control operation mode,and state transition policy of BLP model were improved.And then,ana-lyzes the security of EIBLP was analyzed and proved.It shows that the improved EIBLP model not only satisfies com-pletely the basic security of BLP,but also enhances the integrity of BLP with improving the upward restraints,the subject and object access labels,the model operation mode,and the model state translation rules.At the same time,the improved EIBLP raises the confidentiality of BLP at a certain extent.…”
Get full text
Article -
399
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Published 2022-07-01“…Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical unclonable function (PUF).Through the formal security model and ProVerif tool, it was proved that the protocol satisfies 13 security properties such as information confidentiality, integrity, un-traceability, and forward/backward secrecy.Compared with existing relevant protocols, the computing overhead of the protocol on the device side and the server side is 0.468 ms and 0.072 ms respectively, and the device storage and communication overheads are 256 bit and 896 bit respectively, which is highly suitable for lightweight IoT devices with limited resources.…”
Get full text
Article -
400