نتایج جستجو برای: hardware security ip protection security path
تعداد نتایج: 611393 فیلتر نتایج به سال:
this study aimed at identifying critical factors affecting the security of iranian football stadiums and prioritizing them using the analytical hierarchy process (ahp) for future decisions. in the qualitative stage of the study, the main factors affecting the security of iranian football stadiums were identified in 12 semi-structured interviews with experts. in the quantitative stage, 17 expert...
The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network layers of the TCP/IP stack that maps host identifiers to network locations, thus separating the two conflicting roles that IP addresses have in the current Internet. This paper analyzes the security and functionality of the HI...
Embedded systems have found a very strong foothold in global Information Technology (IT) market since they can provide very specialized and intricate functionality to a wide range of products. On the other hand, the migration of IT functionality to a plethora of new smart devices (like mobile phones, cars, aviation, game or households machines) has enabled the collection of a considerable numbe...
As data and information is stored, combined and accessed almost everywhere, information security and privacy becomes increasingly important to companies that offer access to data. In comparison to network and hardware security that often focus on the protection of network or hardware from attackers from the outside, information security involves protection of certain information from users that...
The detail study of latest advances in wireless network security issues and donations to the wireless networking field. The 4G network technologies guarantee high speed simplicity of right to use during any wireless mechanism by integrate non IP based and IP based strategy and representing services as a entire that the industry is tackle and finally, developing some of the estimated proposals. ...
The Next Steps in Signaling (NSIS) protocol suite represents an extensible framework for enabling various signaling applications over IP-based networks. The framework consists of two layers that need different types of security protection: the lower layer mainly deals with the discovery of adjacent peers, establishment of channel security to protect the delivery of signaling messages between tw...
The Next Steps In Signalling (NSIS) protocol suite represents an extensible framework for enabling various signalling applications over IP-based networks. The framework consists of two layers that need different types of security protection; the lower layer mainly deals with the discovery of adjacent peers and establishment of channel security to protect the delivery of signalling messages betw...
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure etc. and to cooperatively pass their data through the network to a main location. Transmission of large sized images can be a bottleneck for a Wireless Multimedia Sensor Nodes due to its limited resources. Energy of the indivi...
Infrastructure challenges continue to drive considerable public policy debate. The nation’s economy relies very heavily on the combined provision of three critical infrastructures: energy, banking and finance, and information technology (IT). These three critical infrastructures are interconnected, interdependent and cross-cutting essential services to the whole economy. Indeed, the “incapacity...
Hardware security and trust have become a pressing issue during the last two decades due to globalization of semiconductor supply chain ubiquitous network connection computing devices. Computing hardware is now an attractive attack surface for launching powerful cross-layer attacks, allowing attackers infer secret information, hijack control flow, compromise system root-of-trust, steal intellec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید