نتایج جستجو برای: family security
تعداد نتایج: 593459 فیلتر نتایج به سال:
We propose a family of fast and provably secure cryptographic hash functions. The security of these functions relies directly on the well-known syndrome decoding problem for linear codes. Attacks on this problem are well identified and their complexity is known. This enables us to study precisely the practical security of the hash functions and propose valid parameters for implementation. Furth...
MISTY and the Design Intent Behind it MISTY is the family name for two 64-bit blockcipher algorithms, MISTY1 and MISTY2, that have 128-bit keys, designed by the corporation with detailed specifications announced in academic conferences in 1996 and 1997.[1] [2] In terms of security, MISTY has the major benefit of “provable security,” in which the security is proven mathematically against differe...
Current research in operating systems focuses either on security or on reliability. However, modern embedded platforms demand solutions that suit both kinds of requirements. In this paper, we present L4ReAnimator, a framework that allows restarting crashed applications and reestablishing lost communication channels on top of the Fiasco.OC microkernel. It therefore effectively combines the alrea...
Family security depends on many factors, e.g., economic, political and social. Negative social phenomena, including crime, have a significant impact the sense of security. Crime is understood as number prohibited acts committed in given area time unit. Among its various types, we distinguish crime related to functioning family. This study shows scale domestic violence our country recent years. ...
Introduction: The role of the family atmosphere in relation to public health of high school female students in Yazd. Family as a social system is with basic needs, like: Self-esteem, physical security, belonging and intimacy, dependency, responsibility, need to be motivated and approved by others, pointed out the need for happiness, success, and spiritual needs. Every family situation is unique...
The aim of this study was to investigate economic, cultural, social and emotional problems in marriage of martyrs' children in Dehaghan and Shahreza and effects of absence of father in statistical population. Research method was based on menstruation and collection tool was questionnaire too. Population selected among 492 martyrs' children in Dehaghan and Shahreza. According to Cochran&...
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
Minorities and Social Security: an analysis of racial and ethnic differences in the current program.
Executive Summary In recent articles, some commentators have criticized the Social Security system as being unfair to minorities. This criticism has generated discussions about how minority groups fare under the current Social Security system and how they might be affected as the system undergoes changes in the future. To understand the policy implications of any changes for these groups, it is...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید