نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

Journal: :مدیریت ورزشی 0
مهرعلی همتی نژاد . استاد مدیریت ورزشی، دانشکدۀ تربیت بدنی و علوم ورزشی دانشگاه گیلان، رشت، ایران تریسی تیلور . استاد مدیریت ورزشی، دانشکدۀ مدیریت دانشگاه تکنولوژی سیدنی، سیدنی، استرالیا محمدحسن قلی زاده دانشیار مدیریت مالی، دانشکدۀ ادبیات و علوم انسانی دانشگاه گیلان، رشت، ایران رسول فرجی . استادیار مدیریت ورزشی، دانشکدۀ علوم تربیتی و روان شناسی دانشگاه شهید مدنی آذربایجان، تبریز، ایران

this study aimed at identifying critical factors affecting the security of iranian football stadiums and prioritizing them using the analytical hierarchy process (ahp) for future decisions. in the qualitative stage of the study, the main factors affecting the security of iranian football stadiums were identified in 12 semi-structured interviews with experts. in the quantitative stage, 17 expert...

2005
Tuomas Aura Aarthi Nagarajan Andrei V. Gurtov

The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network layers of the TCP/IP stack that maps host identifiers to network locations, thus separating the two conflicting roles that IP addresses have in the current Internet. This paper analyzes the security and functionality of the HI...

Journal: :Computers & Electrical Engineering 2014
Apostolos P. Fournaris Nicolas Sklavos

Embedded systems have found a very strong foothold in global Information Technology (IT) market since they can provide very specialized and intricate functionality to a wide range of products. On the other hand, the migration of IT functionality to a plethora of new smart devices (like mobile phones, cars, aviation, game or households machines) has enabled the collection of a considerable numbe...

2006
Stefan Böttcher

As data and information is stored, combined and accessed almost everywhere, information security and privacy becomes increasingly important to companies that offer access to data. In comparison to network and hardware security that often focus on the protection of network or hardware from attackers from the outside, information security involves protection of certain information from users that...

2016
Pooja Subhash Joshi D. D. Patil

The detail study of latest advances in wireless network security issues and donations to the wireless networking field. The 4G network technologies guarantee high speed simplicity of right to use during any wireless mechanism by integrate non IP based and IP based strategy and representing services as a entire that the industry is tackle and finally, developing some of the estimated proposals. ...

2006
Hannes Tschofenig Xiaoming Fu

The Next Steps in Signaling (NSIS) protocol suite represents an extensible framework for enabling various signaling applications over IP-based networks. The framework consists of two layers that need different types of security protection: the lower layer mainly deals with the discovery of adjacent peers, establishment of channel security to protect the delivery of signaling messages between tw...

Journal: :IJIPT 2006
Hannes Tschofenig Xiaoming Fu

The Next Steps In Signalling (NSIS) protocol suite represents an extensible framework for enabling various signalling applications over IP-based networks. The framework consists of two layers that need different types of security protection; the lower layer mainly deals with the discovery of adjacent peers and establishment of channel security to protect the delivery of signalling messages betw...

2013
Akshaya Gayathri

A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure etc. and to cooperatively pass their data through the network to a main location. Transmission of large sized images can be a bottleneck for a Wireless Multimedia Sensor Nodes due to its limited resources. Energy of the indivi...

2013
John W. Bagby

Infrastructure challenges continue to drive considerable public policy debate. The nation’s economy relies very heavily on the combined provision of three critical infrastructures: energy, banking and finance, and information technology (IT). These three critical infrastructures are interconnected, interdependent and cross-cutting essential services to the whole economy. Indeed, the “incapacity...

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2021

Hardware security and trust have become a pressing issue during the last two decades due to globalization of semiconductor supply chain ubiquitous network connection computing devices. Computing hardware is now an attractive attack surface for launching powerful cross-layer attacks, allowing attackers infer secret information, hijack control flow, compromise system root-of-trust, steal intellec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید