Spelling suggestions: "subject:"dentification"" "subject:"didentification""
41 |
The identification of native grasses by their vegetative charactersCopple, Robert Francis. January 1930 (has links)
Call number: LD2668 .T4 1930 C62
|
42 |
Towards an understanding of lay ecclesiology in the Anglican Communion : statistically based research conducted in five provinces of the Anglican Communion for submitting a thesis to be examined for a higher degreeHenderson, Nicholas Paul January 2009 (has links)
No description available.
|
43 |
Provable security and fairness in cryptographic identification and signature schemes / Sécurité prouvée et équité dans les schémas cryptographiques d'identification et de signatureCathalo, Julien 28 September 2007 (has links)
Identification schemes are public-key cryptographic primitives that allow an entity (called the prover) to prove his or her identity to another entity. An identification scheme is secure if no attacker can impersonate the prover. Digital signature schemes allow an entity to produce a signature on a message; given the message and the signature, another entity can check the identity of the signer and verify that the message was not modified. A secure digital signature scheme is such that an attacker can not produce a forgery, i.e. a false signature.
There has been a lot of work aiming at establishing, in a provable manner, the security of such schemes. Given a cryptographic scheme and a security property, one should be able to demonstrate whether the scheme satisfies it or not. The approach is usually the following: when the security property is not satisfied, show it with an efficient attack; when it is satisfied, use a security proof. But even when they are provably secure, cryptographic schemes can be attacked: it can be at the implementation level, or because of a flaw in the proof.
The goal of this thesis is to apply these approaches to study the security of several public-key cryptographic schemes. We study the GPS identification scheme and show how some implementations can be broken by an efficient attack. We show how to securely sign long messages with RSA. We break a fair exchange signature scheme based on GPS and RSA. We consider a new problem called fair identification and propose a fair identification scheme.
|
44 |
SPECIAL EDUCATION PLACEMENT DECISIONS: A BEHAVIORAL DECISION THEORY PERSPECTIVE.O'REILLY, CAROLYN STOTZ. January 1986 (has links)
Despite the large number of special education eligibility determinations in which school psychologists are involved, and the great deal of integration and interpretation of information that these decisions require, few investigations of the cognitive strategies that school psychologists utilize in assessing placement candidates have been reported. The purpose of this study was to examine the susceptibility of school psychologists to placement decision bias. Specifically, the influence of referral information on school psychologists' subsequent evaluation and classification of a special education candidate was tested. Forty currently practicing school psychologists evaluated a bogus psychological report allegedly written about a child referred for either Gifted or Learning Disabilities (LD) placement consideration. Although all assessment data were identical, the school psychologists receiving a Gifted referral were more likely to classify the child as Gifted, and those receiving an LD referral were more likely to classify the child as LD. Additionally, the school psychologists recalled and weighted the importance of assessment data in a referral-consistent manner.
|
45 |
Determination of diconal in biological fluids and its dispositionCathapermal, S. January 1987 (has links)
No description available.
|
46 |
Forensic evaluation study of MVR-PCR at D18S of an Arab population using capillary electrophoresisAlkhayat, Abdulqader Ibrahim January 2003 (has links)
No description available.
|
47 |
Selective enrichment of genomic DNA data for the isolation of species-specific probes in insectsClapp, Justin Peter January 1992 (has links)
No description available.
|
48 |
Morphometric studies of algal growth and diversity using image analysisWeeks, Paul James Derek January 1995 (has links)
No description available.
|
49 |
Using remember/know states of awareness to improve the eyewitness confidence-accuracy relationshipSeemungal, Florence Vidya January 2001 (has links)
No description available.
|
50 |
HPLC and immunochemical detection of gliadin impurities in wheat and wheat productsMcCarthy, Patrick Kieran January 1990 (has links)
No description available.
|
Page generated in 0.3756 seconds