نتایج جستجو برای: compromising international security

تعداد نتایج: 487404  

Journal: :مطالعات سیاسی 0
مهدی ذاکریان عضو هیات علمی و استادیار گروه روابط بین الملل، واحد علوم و تحقیقات تهران، دانشگاه آزاد اسلامی، تهران، ایران فاطمه سررشته ایزد موسی دانشجوی دوره دکتری تخصصی روابط بین الملل، واحد علوم و تحقیقات تهران دانشگاه آزاد اسلامی، تهران، ایران

0

2011
Lucas Jacob Damien Hutchinson Jemal Abawajy

Since the IEEE ratification of the 802.11 standard in 1999, continuous exploits have been discovered compromising the confidentiality, integrity and availability of 802.11 networks. This paper describes the justification for a project to assess the security status of wireless network usage in society. It reviews the status of both commercial and residential approaches to wireless network securi...

Journal: :فصلنامه تخصصی جنگ ایران و عراق 0
جان اریکسون نویسنده نبی الله ابراهیمی محقق

...

Alimoradi, Reza, Gholami, Ahmad, Noorallahzadeh, Mohammad Hossein,

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده حقوق 1389

چکیده ندارد.

Since a long time ago, the Persian Gulf security has always formed the focus of attention of regional states and the world big powers. During the final years of the 20th and early 21st centuries given the changes and transformations occurring after the US war and Iraq invasion, the significance of the region from security perspective increased. As a result, several conventions and special dialo...

Journal: :مطالعات اوراسیای مرکزی 0
سید کاظم سجادپور سید شمس الدین صادقی

from the perspective of theorists of international relations including functionalists and regionalists, establishment of cooperation and economic, commercial and transportation relations is among the suitable methods for fostering integration in international relations and deepening friendship, peace and stability particularly among regional countries. considering this fact, the authors believe...

2009
J. van Leeuwen Jan van Leeuwen

This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead without compromising security.

2000
Arjen K. Lenstra Eric R. Verheul

This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR in cryptographic protocols leads to substantial savings both in communication and computational overhead without compromising security.

Journal: :Süleyman Demirel Üniversitesi Vizyoner Dergisi 2022

Tarih boyunca bilgi ve bilinebilirlik üzerine pek çok tartışma yaşanmıştır. Özellikle sosyal bilimlerde nesnel bilginin sağlanıp sağlanamayacağı halen konusudur. Bu tartışmanın taraflarından biri olan Feminizme göre araştırmacının geçmişi, kimliği cinsiyeti yaşanan olayların yorumlanmasında kavramsal düşüncelerin şekillenmesinde, dolayısıyla üretilmesinde etki sahibidir. Kadınların 20. yüzyılın...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید