نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
abstract the aim of the present research was to study the objective dimensions of security and the role of sport organizations in providing and developing security from the viewpoint of foreign sport tourists. the research was a descriptive survey. the statistical population (equal to the sample) consisted of foreign sport tourists participating in fajr international sport event (n=394). a rese...
Security forms an important part of wireless network communication system. A variety of attacks can be performed on 802.11 MAC thereby compromising the security of the system and also leading to degradation of the system performance. The security attacks can be classified into different categories based on criteria nature of the attack, domain or attack techniques used. In this work we study th...
0
Millions of people use mobile medical devices—more every day. But our understanding of device security and privacy for such devices is incomplete. Man-inthe-middle attacks can be performed on typical Bluetooth-enabled mobile medical devices, compromising the privacy and safety of patients. In response, we developed the Personal Security Device, a portable device to improve security for mobile m...
In this paper we discuss the concept of Layered Encryption Security(LES). We analyze the need for introducing layering in a security infrastructure. Layered encryption provides us the ability to selectively disclose different parts of data to different parties that might be interested in it without compromising the security of the other parts. We have implemented a simple prototype implementati...
Design and implementation of a query processor for a trusted distributed data base management system
Distributed systems are vital for the efficient processing required in military and commercial applications. For many of these applications, it is especially important that the distributed data base management systems (DDBMS) operate in a secure manner. For example, the DDBMS should allow users, who are cleared at different security levels access to the data base at different levels of data sen...
This paper presents PATRIOT, an optimized, policydriven security architecture for protecting the confidentiality and integrity of audit log files on wireless devices. PATRIOT is based on a set of well-known cryptographic protocols and is designed to suit the limited nature of wireless devices. It offers a policy-driven, customizable security model and specifies a flexible, multi-level, and fine...
Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These systems often collect provenance information that is useful in the analysis and reproduction of such experiments. On the other hand, this provenance data may be exposed to security threats which can result, for instance, in compromising the analysis of these experiments...
This paper presents an eecient stream cipher using an internal state with variable structure and evolution. Arbitrarily large internal states can be used in order to defeat brute-force guessing attacks without compromising the performance of cipher, and possibly improving it. Attacking is made even more complicated by dynamically chosing diierent topologies and evo-lutions for the cipher's inte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید