نتایج جستجو برای: avoidanceanxiety insecure

تعداد نتایج: 4640  

2001
Feng Bao Robert H. Deng Willi Geiselmann Claus-Peter Schnorr Rainer Steinwandt Hongjun Wu

The application of sparse polynomials in cryptography has been studied recently. A public key encryption scheme EnRoot [4] and an identification scheme SPIFI [1] based on sparse polynomials were proposed. In this paper, we show that both of them are insecure. The designers of SPIFI proposed the modified SPIFI [2] after Schnorr pointed out some weakness in its initial version. Unfortunately, the...

2000
Arnd Weber

Such trade does, however, take place on an insecure environment (the Internet), in which communication partners may cheat, and in which other parties may do harm. Table 1 highlights a number of threats. On the Internet, most players use insecure equipment. Typically they cannot send each other electronic documents with evidential value. Insider fraud, as well as damage caused by organised crime...

1998
Dan Bonachea Scott McPeak

SafeTP makes FTP traffic secure, transparent, and interoperable. Security – confidentiality, integrity, and authenticity – is provided by a hybrid public-key and shared-key cryptosystem. Transparency – the ability to use existing FTP software and make it secure – is achieved by the insertion of a proxy layer. Interoperability – compatibility with the installed base of insecure FTP clients and s...

Journal: :مجله روان شناسی و علوم تربیتی 0
محمد علی بشارت کیومرث کریمی عباس رحیمی نژاد

the main purpose of this research was 10 study the relationship between attachment styles (secure. avoidant, ambivalent) and personality dimensions (neuroticism. extraversion, openness, agreeableness. consciousness) . two hundred and thirty three students ( 102 male. 131 female ) from the university of tehran participated in this study . adult attachment inventory (aai) was applied for measurin...

Journal: :IEICE Transactions on Information and Systems 2020

2016
Anjila Tamrakar

Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored [27]. This paper presents a comprehe...

Journal: :Attachment & human development 2006
Barbara Figueiredo Antonia Bifulco Alexandra Pacheco Raquel Costa Rute Magarinho

The aim of this Portuguese study is to compare the experience of pregnancy in teenage years and later adulthood and to examine insecure attachment style as a risk factor for depression during pregnancy. The Attachment Style Interview (ASI) and the Edinburgh Postnatal Depression Scale (EPDS) were administered to 66 pregnant adolescents and 64 adult women. Pregnant teenagers were found to be near...

2017
Giorgio Falgares Daniela Marchetti Sandro De Santis Danilo Carrozzino Daniel C. Kopala-Sibley Mario Fulcheri Maria Cristina Verrocchio

Insecure attachment and the personality dimensions of self-criticism and dependency have been proposed as risk factors for suicide in adolescents. The present study examines whether self-criticism and dependency mediate the relationship between insecure attachment styles and suicidality. A sample of 340 high-school students (73.2% females), ranging in age from 13 to 20 years (M = 16.47, SD = 1....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید