نتایج جستجو برای: secure sets

تعداد نتایج: 266654  

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

Journal: :Journal of Software Engineering 2011

2006
David Simplot-Ryl Isabelle Simplot-Ryl

Secure key establishment in wireless sensor networks has been shown to be efficient. For sake of computation power, predistribution of symmetric keys is recommended. In such schemes, a set S of keys is used and each deployed node knows a subset of S. However, the capture of nodes can quickly lead to the corruption of a significant part of the network and solutions like multi-deployment have bee...

2016
Nilofer Shoaib Khan Umesh Lilhore

In the field of Information technology security plays a vital role. Unauthorized entries or any anomalies in system are known as intrusion and detection of these anomalies are known as Intrusion Detection System (IDS). As the attacks have increased in huge numbers over the past few years, IDS is increasingly becoming a critical component to secure the network. Designing of an efficient Intrusio...

2015
Alysson Neves Bessani Jörgen Brandt Marc Bux Vinicius V. Cogo Lora Dimitrova Jim Dowling Ali Gholami Kamal Hakimzadeh Micheal Hummel Mahmoud Ismail Erwin Laure Ulf Leser Jan-Eric Litton Roxanna Martinez Salman Niazi Jane Reichel Karin Zimmermann

Biobanks store and catalog human biological material that is increasingly being digitized using next-generation sequencing (NGS). There is, however, a computational bottleneck, as existing software systems are not scalable and secure enough to store and process the incoming wave of genomic data from NGS machines. In the BiobankCloud project, we are building a Hadoop-based platform for the secur...

2005
Sujaa Rani Mohan E. K. Park Yijie Han

Weak data dependencies in large databases coupled with poorly written web based applications are a major cause for malicious transactions. The problem of security becomes especially acute when access roles are changed among users. Also the poorly maintained data base caches are a cause for added security leaks. We propose an adaptive Intrusion detection system to keep track of the varying data ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز 1387

این پایان نامه یک پروتکل پرداخت برای محیط های ناامن تجارت سیار ارائه می کند. این پروتکل با غلبه بر محدودیت های تکنولوژی و گوشی های موبایل، فرایند پرداخت سیار را بهینه کرده و با اعمال یک مکانیزم منطقی، علاوه بر آسان تر کردن مراحل پیاده سازی، مولفه های امنیتی پرداخت سیار را برآورده می کند. این مکانیزم با پروتکل 3d secure از بعد پیاده سازی و مولفه های امنیتی مقایسه و مورد تجزیه و تحلیل قرار گرفته ...

2016
Donald G. Dutton René A. Lane Tamara Koren Kim Bartholomew

This study examines the impact of a visual representation of a secure base (i.e. a secure base prime) on attenuating experimentally produced anger and anxiety. Specifically, we examined the assuaging of negative emotions through exposure to an image of a mother-infant embrace or a heterosexual couple embracing. Subjects seated at a computer terminal rated their affect (Pre Affect) using the Aff...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید