نتایج جستجو برای: spying operation

تعداد نتایج: 211944  

Journal: :IJESMA 2011
Sebastian Obermeier Stefan Böttcher

A distributed protocol is presented for anonymous and secure voting that is failure-tolerant with respect to malicious behavior of individual participants and that does not rely on a trusted third party. The proposed voting protocol was designed to be executed on a fixed group of N known participants, each of them casting one vote that may be a vote for abstention. Several attack vectors on the...

2014
Paschalis Papagrigoriou Anargyros Plemenos Ioannis G. Askoxylakis

With the dramatic shift of internet use away from desktop and laptop PCs toward smartphones and tablets, protection thresholds for application, device and communication security have significantly lowered. Most attempts on reversing this situation by means of converting standard mobile devices into tamper-proof equipment have proven to leave ample space for vulnerability of mobile processes and...

Journal: :دانشنامه حقوق اقتصادی 0
حسام قپانچی حمیدرضا دانش ناری زهرا دانش ناری

corporations have a key role in economic development, growth of national security and financial competition. the key of power is in economy. so in the global village, the economic competition replaces military conflict. a new concept in criminal justice is corporate crime. these crimes as a kind of white collar crime are studied in light of critical criminology findings of this study shows that...

2016
Christian Dietz Anna Sperotto Gabi Dreo Rodosek Aiko Pras

Botnets are an enabler for many cyber-criminal activities and often responsible for DDoS attacks, banking fraud, cyber-espionage and extortion. Botnets are controlled by a botmaster that uses various advanced techniques to create, maintain and hide their complex and distributed C&C infrastructures. First, they use P2P techniques and domain fast-flux to increase the resilience against take-down ...

Journal: :CoRR 2015
Timothy Libert

This article provides a quantitative analysis of privacy compromising mechanisms on one million popular websites. Findings indicate that nearly nine in ten websites leak user data to parties of which the user is likely unaware of; over six in ten websites spawn third-party cookies; and over eight in ten websites load Javascript code from external parties onto users’ computers. Sites which leak ...

2014
David Machin Frank Griffith

Taking the example of two 1960s popular spy films this paper explores how social semiotics can make a contribution to the analysis of film music. Following other scholars who have sought to create inventories of sound meanings to help us break down the way that music communicates, this paper explores how we can draw on the principles of Hallidayan functional grammar to present an inventory of m...

Journal: :Locus 2021

Studies on underground (or clandestine forms of political struggle) remain largely unknown with just a few them published. The study focuses work in southern Mozambique from the 1950s to 1970s. main argument that seeks make is despite intensification colonial exploitation for benefit Portuguese capital, violent repression, imprison and systematic denial exercise rights most Mozambican people, p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید