The Usage Intention of Combined Guard System - Focusing on GOP Scientific Guard System -
نویسندگان
چکیده
منابع مشابه
a study on construction of iranian life tables: the case study of modified brass logit system
چکیده ندارد.
15 صفحه اولPaying the Guard: an Entry-Guard-based Payment System for Tor (Short Paper)
When choosing the three relays that compose a circuit, Tor selects the first hop among a restricted number of relays called entry guards, pre-selected by the user himself. The reduced number of entry guards, that until recently was fixed to three, helps in mitigating the effects of several traffic analysis attacks. However, recent literature indicates that the number should be further reduced, ...
متن کاملPaying the Guard: An Entry-Guard-Based Payment System for Tor
When choosing the three relays that compose a circuit, Tor selects the first hop among a restricted number of relays called entry guards, pre-selected by the user himself. The reduced number of entry guards, that until recently was fixed to three, helps in mitigating the effects of several traffic analysis attacks. However, recent literature indicates that the number should be further reduced, ...
متن کاملAutomatic Detection of the Guard Interval Length in OFDM System
Orthogonal Frequency Division Multiplexing (OFDM) has been increasingly used in wireless broadband communication systems. Guard interval (GI) is used in OFDM system to reduce inter-symbol interference (ISI). As selection of the length of guard interval depends on the channel condition, the length of guard interval will change dynamically. Thus there must be a way to synchronize this parameter b...
متن کاملScotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage
The growing reliance on cloud-based services has led to increased focus on cloud security. Cloud providers must deal with concerns from customers about the overall security of their cloud infrastructures. In particular, an increasing number of cloud attacks target resource allocation in cloud environments. For example, vulnerabilities in a hypervisor scheduler can be exploited by attackers to e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Information Systems
سال: 2010
ISSN: 1229-8476
DOI: 10.5859/kais.2010.19.4.183