Results 1 - 10
of
3,201
Table 1: Several known authentication protocols. An authentication protocol is a sequence of mes- sages that two principals undertake to perform mu- tual authentication. The rst signi cant such pro- tocol was due to Needham and Schroeder [18], which gained added notoriety when it was shown to be awed. Table 1 lists several known authentication protocols [14], where PK, SK and OF refer to public key, private key and one-way functions respectively. There are several implementations of authen- tication systems available, with Kerberos [16] be- ing the most popular. Kerberos was developed at MIT with DEC during their joint Project Athena, 3
Table 1: quot;All university lecturers should also undertake research quot;
"... In PAGE 12: ... This percentage is only 28,6 of in the Spanish case, which is in line with the perception that UK lecturers are closer to their students than the Spanish ones. Finally, in Table1 it can be seen that above 50% of both, Spanish and UK accounting academics, agree in that all lecturers should also undertake research. These results support the idea presented by Dopuch (1989) and Patten (1996) that research is a way of ensuring that the lecturer is to maintain and update knowledge in their field.... ..."
Table 1: Table showing the procedure for the two groups of participant undertaking the spatial vs. non-spatial experiment.
"... In PAGE 2: ... Each condition consisted of a training and a test- ing phase. The order of conditions for each group is shown in Table1 . The main hypothesis investigated was that concurrently presented earcons complying only with the guidelines of BWE in a spatial audio environment would be significantly easier to identify than earcons which also incorporated the CEG from McGookin and Brewster [2, 7] on concurrent earcon presentation, but were presented in a common spatial location.... ..."
Cited by 3
Table 5.2: Principal subsidiary undertakings and associates Company Country % holding Principal Activity
2005
TABLE II PERCENTAGE OF COMPANIES THAT ARE UNDERTAKING SECURITY MEASURES FOR E-MAIL PROTECTION [7]
Table 3: Task 2 participants. The table shows the overview of the participants undertaking task 2.
2005
Table 2. Some car manufacturers undertaking the development of fuel-cell vehiclesa.
"... In PAGE 6: ...infrastructure for the supply and production of hydrogen (the move towards the so-called apos;Hydrogen Economy apos;). Some manufacturers (mainly automotive) who have produced prototype FCVs over the past six years are listed in Table2 . Clearly, most of these companies are favouring the fuel- cell-battery hybrid.... ..."
Table 1 | Centres that are undertaking structural genomics projects Centre Leader Key ideas Website Reference
Table A.2. Coefficient Hip Joint Knee Joint Ankle Joint
Results 1 - 10
of
3,201