Proactive EBIPM

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proactive RSA

The notion of \proactive security" of basic primitives and cryptosystems has been introduced by Ostrovsky and Yung to deal with a very strong \mobile adversary" who may corrupt all participants (servers, each with private memory) throughout the lifetime of the system in a non-monotonic fashion (i.e. recoveries are possible), but who is not able to corrupt too many participants during any short ...

متن کامل

Credential Proactive Protection Guard: A Proactive Password Checking Tool

Over the internet, user profiling is one of the key activity in which user is asked to provide personal as well as professional information. The user is not aware about the misuse of profiling. It has been observed that user choose password from his/her profile unintentionally which create serious problem. The password has been taken from small domain which enables hackers to crack credentials ...

متن کامل

Proactive control of proactive interference using the method of loci

Proactive interferencebuilds up with exposure to multiple lists of similar items with a resulting reduction in recall. This study examined the effectiveness of using a proactive strategy of the method of loci to reduce proactive interference in a list recall paradigm of categorically similar words. While all participants reported using some form of strategy to recall list words, this study demo...

متن کامل

DYONIPOS: Proactive Knowledge Management

Efficient and effective knowledge management plays an increasingly important role in knowledge intensive organizations. That’s because on the one hand knowledge workers need more and more knowledge to fulfil their daily work and on the other hand because the ad hoc part of a process increases. In addition the knowledge acquisition for the knowledge workers is increasingly catchier because of th...

متن کامل

Proactive Byzantine Quorum Systems

Byzantine Quorum Systems is a replication technique used to ensure availability and consistency of replicates data even in presence of arbitrary faults. This paper presents a Byzantine Quorum Systems protocol that provides atomic semantics despite the existence of Byzantine clients and servers. Moreover, this protocol is integrated with a protocol for proactive recovery of servers. In that way,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Rangelands

سال: 2012

ISSN: 0190-0528

DOI: 10.2111/rangelands-d-12-00055.1