• No results found

One Time Password Scheme Via Secret Sharing Techniques

N/A
N/A
Protected

Academic year: 2020

Share "One Time Password Scheme Via Secret Sharing Techniques"

Copied!
50
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1: The functions involved in the update procedure. Note values have not been modulated into     for visualization purposes
Table 1: All possible hidden update material for each fixed secret.
Table 2 : Computational requirement breakdown

References

Related documents

posting conduct attributes as summarized from a person’s weekly tweet postings; and (b) social interaction attributes extracted from a person’s social interactions

The pattern of distortion in reciprocal backcross pop- lethal interactions between developing ovules and the ulations revealed that extreme drive at D is female spe- maternal

To investigate the imbalanced data set problem when Support Vector Machine (SVM) is combining with Synthetic Minority Oversampling Technique (SMOTE) algorithm. Then the

In this study, all arterial blood vessels were assumed to be straight and treated as porous medium, constant heat transfer coefficient and blood velocity were used, and thermal

The decay heat generated during any reactor scram is transported to the condensation pool from the primary system through the (314) safety relief valves and from

24th Conference on Structural Mechanics in Reactor Technology BEXCO, Busan, Korea - August 20-25, 2017 Division V.. If the beam member has small torsional rigidity, the

Bahan polimer banyak digunakan sebagai bahan pembungkusan makanan. Toluena residu yang tertinggal di dalam bahan pembungkusan boleh meresap masuk ke dalam makanan yang dibungkus

Having the smallest average of error rate, standard deviation value closer to 0 and simulated line closest to experimental line shows that PSO is a more consistent method to