نتایج جستجو برای: درجه ی api
تعداد نتایج: 151566 فیلتر نتایج به سال:
The W3C Web Cryptography API will be the standard API for accessing cryptographic primitives in Javascript-based environments. We describe the motivations behind the creation of the W3C Web Cryptography API, deal with a number of objections, and then describe the API in detail with motivating use-cases and sample code. Lastly, we outline open issues and how the wider academic and security commu...
In computer programming, an application programming interface (API) is a set of routines, protocols, and tools for building software applications. An API expresses a software component in terms of its operations, inputs, outputs, and underlying types. An API defines functionalities that are independent of their respective implementations, which allows definitions and implementations to vary wit...
The Simple and Protected GSS-API Negotiation Mechanism defined here is a pseudo-security mechanism, represented by the object identifier iso.org.dod.internet.security.mechanism.snego (1.3.6.1.5.5.2) which enables GSS-API peers to determine in-band whether their credentials share common GSS-API security mechanism(s), and if so, to invoke normal security context establishment for a selected commo...
The naming extensions to the Generic Security Service Application Programming Interface (GSS-API) provide a mechanism for applications to discover authorization and personalization information associated with GSS-API names. The Extensible Authentication Protocol GSS-API mechanism allows an Authentication, Authorization, and Accounting (AAA) peer to provide authorization attributes alongside an ...
We revise a known attack on the PIN verification framework, based on a weakness of the underlying security API. We specify this flawed API in an imperative language with cryptographic primitives and we show why its type-based verification fails in the type system of Myers, Sabelfeld and Zdancewic. We propose an improved API, extend the type system with cryptographic primitives for assuring inte...
امروزه در کشورهای توسعه یافته و در حال توسعه، شبکههای خطوط انتقال فاضلاب، نصب شده و یا در حال نصب است. در حال حاضر منابع اصلی جمعآوری اطلاعات از وضعیت لولههای فاضلاب، استفاده از دوربینهای cctv و تخمین عمر لولهها است که اطلاعاتی قطعی ارائه نمیکنند. مدیریت بر تاسیسات فاضلاب نیازمند داشتن اطلاعات مطمئن از وضعیت تجهیزات است. لذا ضروری است تا اطلاعات مطمئن به صورت کمی و هندسی از وضعیت آنها پس...
Learning to use existing or new software libraries is a difficult task for software developers, which would impede their productivity. Much existing work has provided different techniques to mine API usage patterns from client programs in order to help developers on understanding and using existing libraries. However, considering only client programs to identify API usage patterns is a strong c...
API error-handling specifications are often not documented, necessitating automated specification mining. Automated mining of error-handling specifications is challenging for procedural languages such as C, which lack explicit exception-handling mechanisms. Due to the lack of explicit exception handling, error-handling code is often scattered across different procedures and files making it diff...
Objective: This study examined subsite-specific colorectal cancer incidence rates and stage distributions for Asians and Pacific Islanders (API) and compared the API data with data for Whites and African Americans. Methods: Data included 336,798 invasive colorectal cancer incident cases for 1995 to 1999 from 23 population-based central cancer registries, representing about two thirds of API pop...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید