• Aucun résultat trouvé

distance bounding protocol

Vssdb: A Verifiable Secret-Sharing Distance-Bounding Protocol

Vssdb: A Verifiable Secret-Sharing Distance-Bounding Protocol

... against distance- bounding (DB) protocols in which a distant malicious prover colludes with an attacker located in a verifier’s proximity when authenticat- ...asymmetric distance-bounding ...

21

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

... Introducing privacy with respect to the verifier raises the question of the revocability of a prover by the registration authority. Hence, before the authentication succeeds, the verifier should check whether this prover ...

13

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

... 2 The TREAD instantiations In this section, we present TREAD, a generic construction, which encompasses all the desirable properties of a secure DB protocol. To counter terrorist-fraud attack, the usual strategy ...

31

2-Distance Colorings of Integer Distance Graphs

2-Distance Colorings of Integer Distance Graphs

... Keywords: 2-distance coloring; Integer distance graph. MSC 2010: 05C15, 05C12. 1 Introduction All the graphs we consider in this paper are simple and loopless undirected graphs. We denote by V (G) and E(G) ...

14

Virtual Trials of the NICE-SUGAR Protocol: The Impact on Performance of Protocol and Protocol Compliance

Virtual Trials of the NICE-SUGAR Protocol: The Impact on Performance of Protocol and Protocol Compliance

... per protocol, with higher percentage BG in the ...NS-3H protocol results in a mean ...per protocol, the NICE-SUGAR study would require ~25 measurements per day, which is 1/hour and not clinically ...

6

Transformation paramétrique de distance à vol d’oiseau en distance sur une voirie

Transformation paramétrique de distance à vol d’oiseau en distance sur une voirie

... L’étude, proposée par Catherine Gloaguen 1 et encadrée par Hermine Biermé 2 , vise à proposer une estimation d’une distance ∆ au plus court chemin sur une carte aléatoire modélisant des grands réseaux d’accès ...

16

A strategy for bounding attributable risk: a lung cancer example.

A strategy for bounding attributable risk: a lung cancer example.

... elicitation protocol we ask the experts to systematically revisit all the bounds they have set and consider reassessing some if they are not similarly confident about all of ...that bounding argu- ments can ...

4

Degrees bounding principles and universal instances in reverse mathematics

Degrees bounding principles and universal instances in reverse mathematics

... EGREES BOUNDING THE ATOMIC MODEL THEOREM The atomic model theorem is a statement of model theory admitting a simple, purely computability-theoretic characterization over ...

24

Overcommuting pairs in groups and 3-manifolds bounding them

Overcommuting pairs in groups and 3-manifolds bounding them

... Hence, topologically, a group element g ∈ G lies in the commutator subgroup [G, G] exactly if there exists a compact orientable surface S with one boundary component and a continuous map from S to BG so that the boundary ...

18

Bounding Linear Head Reduction and Visible Interaction Through Skeletons

Bounding Linear Head Reduction and Visible Interaction Through Skeletons

... Definition 3.2.. We are interested in the maximal length of a visible pointer structure resulting from the interaction between two bounded strategies. Since the collapse of plays to visi[r] ...

49

Bounding equilibrium payoffs in repeated games with private monitoring

Bounding equilibrium payoffs in repeated games with private monitoring

... This paper gives a simple sufficient condition (δ > δ ∗ ) under which the equilibrium pay- off set in a two-player repeated game with mediated perfect monitoring is a tight, re- cursi[r] ...

40

Bounding memory access interferences on the Kalray MPPA3 compute cluster

Bounding memory access interferences on the Kalray MPPA3 compute cluster

... Baufreton (Safran philippe.baufreton@safrangroup.com) Project-Teams KAIROS Research Report n° 9404 — December 2020 — 24 pages Abstract: The Kalray MPPA3 Coolidge many-core processor is one of the few off-the-shelf ...

28

Symbolically Bounding the Drift in Time-Constrained MSC-Graphs

Symbolically Bounding the Drift in Time-Constrained MSC-Graphs

... distributed protocol, we expect any scenario labeling the node to be executable in a bounded time, say ...A protocol specified as a TC-MSC graph that is not K-drift-bounded should thus be considered as ...

25

Distance de collaboration

Distance de collaboration

... On l’aura aisément compris en consultant l’image ci-dessus, il suffit simplement d’introduire les noms des deux personnes concernées dans des cases prévues à cet effet : l’ordinateur fournit alors les noms de ...

3

Autonomous error bounding of position estimates from GPS and Galileo

Autonomous error bounding of position estimates from GPS and Galileo

... To determine how many satellites to use per subset we compute the optimal single metric algorithms for each subset size of a fixed number of visible satellites.. [r] ...

81

Aggregated bounding Markov processes applied to the analysis of tandem queues

Aggregated bounding Markov processes applied to the analysis of tandem queues

... Table 3: Packet Loss Probabilities (PLP) The choice of the aggregation scheme and the value of ∆ lets to find a tradeoff between the accuracy of the bounds and the complexity of numerical resolution. We can start with ...

10

Enseignement à distance : l'expérience acquise au cours de la réalisation de la maîtrise à distance NTIDE

Enseignement à distance : l'expérience acquise au cours de la réalisation de la maîtrise à distance NTIDE

... Contrairement à ce que l’on croit, le travail est plus convivial dans un cours à distance que dans un cours présentiel. En effet, les groupes de travail mis en place (Forums) permettent un travail de groupe et la ...

8

Upper Bounding in Inner Regions for Global Optimization under Inequality Constraints

Upper Bounding in Inner Regions for Global Optimization under Inequality Constraints

... Upper Bounding in Inner Regions for Global Optimization under Inequality Constraints Ignacio Araya, 1 Gilles Trombettoni, 2 Bertrand Neveu, 3 and Gilles Chabert 4 1 UTFSM, Universitad Federico Santa Maria, ...

5

Upper Bounding in Inner Regions for Global Optimization under Inequality Constraints

Upper Bounding in Inner Regions for Global Optimization under Inequality Constraints

... upper bounding the objective function generally resorts to local minimization at several nodes/iterations of the branch and ...upper bounding shows very good performance obtained on medium-sized systems ...

25

Bounding of linear output functionals of parabolic partial differential equations

Bounding of linear output functionals of parabolic partial differential equations

... In the figure, as Ate, the size of the coarse mesh time step, decreases, the resolution of the coarse mesh increases, and the errors drop; eUB is the error in the upp[r] ...

47

Show all 1685 documents...

Sujets connexes