منابع مشابه
A Secure World
H Ho ow w s sc ci ie en nc ce e c ca an n h he el lp p 2 editorial options ■ summer 2006 W hen IIASA was established in the midst of the Cold War, security was essentially a state-centered notion and self-defense against external hostilities was the mainstay of many countries' security strategy. The foundation of IIASA in 1973 was, in itself, a signal that this narrow " national security " mind...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملA secure world-wide-web daemon
In this paper, we begin by discussing some of the protection-related history of world-wide-web servers and clients, some of their better-known vulnerabilities, and the need for a more secure server environment. We then discuss the protection goals we believe to be of import to a world-wide-web server, outline some of the principles we believe to be important to attaining such a server, and anal...
متن کاملSecure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Intercultural Communication
سال: 2018
ISSN: 2451-0998,2543-7461
DOI: 10.13166/inco/105535