The Usage Intention of Combined Guard System - Focusing on GOP Scientific Guard System -

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Paying the Guard: an Entry-Guard-based Payment System for Tor (Short Paper)

When choosing the three relays that compose a circuit, Tor selects the first hop among a restricted number of relays called entry guards, pre-selected by the user himself. The reduced number of entry guards, that until recently was fixed to three, helps in mitigating the effects of several traffic analysis attacks. However, recent literature indicates that the number should be further reduced, ...

متن کامل

Paying the Guard: An Entry-Guard-Based Payment System for Tor

When choosing the three relays that compose a circuit, Tor selects the first hop among a restricted number of relays called entry guards, pre-selected by the user himself. The reduced number of entry guards, that until recently was fixed to three, helps in mitigating the effects of several traffic analysis attacks. However, recent literature indicates that the number should be further reduced, ...

متن کامل

Automatic Detection of the Guard Interval Length in OFDM System

Orthogonal Frequency Division Multiplexing (OFDM) has been increasingly used in wireless broadband communication systems. Guard interval (GI) is used in OFDM system to reduce inter-symbol interference (ISI). As selection of the length of guard interval depends on the channel condition, the length of guard interval will change dynamically. Thus there must be a way to synchronize this parameter b...

متن کامل

Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage

The growing reliance on cloud-based services has led to increased focus on cloud security. Cloud providers must deal with concerns from customers about the overall security of their cloud infrastructures. In particular, an increasing number of cloud attacks target resource allocation in cloud environments. For example, vulnerabilities in a hypervisor scheduler can be exploited by attackers to e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Information Systems

سال: 2010

ISSN: 1229-8476

DOI: 10.5859/kais.2010.19.4.183