期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
How to Develop an Oral Test-Interview
1
作者 闫丽霞 《阴山学刊》 2010年第3期120-124,共5页
Because of the difference and the particularity of oral test among reading,listening and writing,oral test should focus on the framework,the interviewer and the marking system.In addition,some instructions for oral in... Because of the difference and the particularity of oral test among reading,listening and writing,oral test should focus on the framework,the interviewer and the marking system.In addition,some instructions for oral interview and the training of assessors also play important roles in the test.In order to make the oral test-interview more successful,some other facts should be considered when having the test,such as the reliability,construct validity and authenticity. 展开更多
关键词 Oral test INTERVIEWER Marking system RELIABILITY Validity Autheticity
在线阅读 下载PDF
New Enhanced Authentication Protocol for Internet of Things 被引量:9
2
作者 Mourade Azrour Jamal Mabrouki +1 位作者 Azedine Guezzaz Yousef Farhaoui 《Big Data Mining and Analytics》 EI 2021年第1期1-9,共9页
Internet of Things(IoT)refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.Nowadays,due to its multiple advantages,the IoT i... Internet of Things(IoT)refers to a new extended network that enables to any object to be linked to the Internet in order to exchange data and to be controlled remotely.Nowadays,due to its multiple advantages,the IoT is useful in many areas like environment,water monitoring,industry,public security,medicine,and so on.For covering all spaces and operating correctly,the IoT benefits from advantages of other recent technologies,like radio frequency identification,wireless sensor networks,big data,and mobile network.However,despite of the integration of various things in one network and the exchange of data among heterogeneous sources,the security of user’s data is a central question.For this reason,the authentication of interconnected objects is received as an interested importance.In 2012,Ye et al.suggested a new authentication and key exchanging protocol for Internet of things devices.However,we have proved that their protocol cannot resist to various attacks.In this paper,we propose an enhanced authentication protocol for IoT.Furthermore,we present the comparative results between our proposed scheme and other related ones. 展开更多
关键词 authetication Internet of Things(IoT) SENSOR SECURITY AUTHORIZATION
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部