
در این قسمت پاورپوینتی قرار داده شده است که در عین سادگی کاملا شیک و مجلل می باشد. قالب کلی پاور پواینت آماده می باشد و فقط لازم است مطالب خود را در داخل آن پیست نمائید.
دانلود پاورپوینت بسیار زیبا برای ارائه - power point for presentation

در این قسمت پاورپوینتی قرار داده شده است که در عین سادگی کاملا شیک و مجلل می باشد. قالب کلی پاور پواینت آماده می باشد و فقط لازم است مطالب خود را در داخل آن پیست نمائید.
124 صفحه
ویرایش 24 ام
API 6D:2014
Specification for Pipeline and Piping Valves
24 صفحه
API 20F:2015-Corrosion Resistant Bolting for Use in the Petroleum and Natural Gas Industries

Ship Design and Performance for Masters and Mates-Butterworth-Heinemann (2004)
کتاب مربوط به طراحی کشتی با استفاده از فرمول ها و روابط تجربی
مورد نیاز تمام مهندسان کشتی سازی

a b s t r a c t
Understanding security failures of cryptographic protocols is the key to both patching
existing protocols and designing future schemes. In this work, we investigate two recent
proposals in the area of smart-card-based password authentication for security-critical
real-time data access applications in hierarchical wireless sensor networks (HWSN). Firstly,
we analyze an efficient and DoS-resistant user authentication scheme introduced by Fan
et al. in 2011. This protocol is the first attempt to address the problems of user authenti-
cation in HWSN and only involves lightweight cryptographic primitives, such as one-
way hash function and XOR operations, and thus it is claimed to be suitable for the
resource-constrained HWSN environments. However, it actually has several security loop-
holes being overlooked, and we show it is vulnerable to user anonymity violation attack,
smart card security breach attack, sensor node capture attack and privileged insider attack,
as well as its other practical pitfalls. Then, A.K. Das et al.’s protocol is scrutinized, and we
point out that it cannot achieve the claimed security goals: (1) It is prone to smart card
security breach attack; (2) it fails to withstand privileged insider attack; and (3) it suffers
from the defect of server master key disclosure. Our cryptanalysis results discourage any
practical use of these two schemes and reveal some subtleties and challenges in designing
this type of schemes. Furthermore, using the above two foremost schemes as case studies,
we take a first step towards investigating the underlying rationale of the identified security
failures, putting forward three basic principles which we believe will be valuable to proto-
col designers for advancing more robust two-factor authentication schemes for HWSN in
the future.