نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
0
Since the IEEE ratification of the 802.11 standard in 1999, continuous exploits have been discovered compromising the confidentiality, integrity and availability of 802.11 networks. This paper describes the justification for a project to assess the security status of wireless network usage in society. It reviews the status of both commercial and residential approaches to wireless network securi...
...
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
چکیده ندارد.
Since a long time ago, the Persian Gulf security has always formed the focus of attention of regional states and the world big powers. During the final years of the 20th and early 21st centuries given the changes and transformations occurring after the US war and Iraq invasion, the significance of the region from security perspective increased. As a result, several conventions and special dialo...
from the perspective of theorists of international relations including functionalists and regionalists, establishment of cooperation and economic, commercial and transportation relations is among the suitable methods for fostering integration in international relations and deepening friendship, peace and stability particularly among regional countries. considering this fact, the authors believe...
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead without compromising security.
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead without compromising security.
Tarih boyunca bilgi ve bilinebilirlik üzerine pek çok tartışma yaşanmıştır. Özellikle sosyal bilimlerde nesnel bilginin sağlanıp sağlanamayacağı halen konusudur. Bu tartışmanın taraflarından biri olan Feminizme göre araştırmacının geçmişi, kimliği cinsiyeti yaşanan olayların yorumlanmasında kavramsal düşüncelerin şekillenmesinde, dolayısıyla üretilmesinde etki sahibidir. Kadınların 20. yüzyılın...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید