نتایج جستجو برای: especially security needs

تعداد نتایج: 778134  

2001
Lenka Fibíková Jozef Vyskoč

The size of cryptographic keys belongs to aspects that are quite easily dealt with in theory but that have to be carefully weighted in the practical cryptography. Particularly, current as well as predicted advances in technology must be taken into account as these dictate lower bounds for the key size to ensure reasonable security even with respect to specialized machines. On the other hand too...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

Journal: :J. UCS 2005
Valentina Casola Rosa Preziosi Massimiliano Rak Luigi Troiano

In a world made of interconnected systems which manage huge amounts of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability to evaluate policies is becoming more and more relevant, especially when referred to the cooperation of services belonging to un-trusted domains. We have focused our attention ...

Journal: :Computers & Security 2003
Kwok-Yan Lam Siu Leung Chung Ming Gu Jia-Guang Sun

This paper describes a security middleware for enhancing the interoperability of public key infrastructure (PKI). Security is a key concern in e-commerce and is especially critical in cross-enterprise transactions. Public key cryptography is widely accepted as an important mechanism for addressing the security needs of e-commerce transactions because of its ability to implement nonrepudiation. ...

2014

Recently, there has been an increase of reported security incidents hitting large software systems. Such incidents can originate from different attackers exploiting vulnerabilities of different parts of a system. Hence, there is a need for enhancing security considerations in software development. It is crucial for requirements engineers to identify security threats early on, and to refine the ...

Nejati, Vahid, Shoaei, Fatemeh,

Objectives: Nowadays, in developed countries the rate of growing old population increases due to medical and public heath improvements, leading to increased life expectancy. So, providing a special elderly caring service system seems to be necessary. The purpose of this study was to compare the elderly- caring service pattern in Iran and in USA. Methods & Materials: This systematic review ai...

1997
Stephen Heilbronner

Nomadic computing using powerful portable systems has entered the mainstream of computing due to the recent progress in terms of performance and usability of the necessary hardware. However, most of these systems are still being used stand-alone with almost no provision for management support in the home as well as in the visited domain. This complicates connguration by forcing manual intervent...

ژورنال: طلوع بهداشت یزد 2015

Introduction: The role of the family atmosphere in relation to public health of high school female students in Yazd. Family as a social system is with basic needs, like: Self-esteem, physical security, belonging and intimacy, dependency, responsibility, need to be motivated and approved by others, pointed out the need for happiness, success, and spiritual needs. Every family situation is unique...

Journal: :Holistica 2022

Abstract In the light of current pandemic, labour market has suffered many changes: from typical 9 to 5 job done office, accommodation a work home type job. Even if we speak about employer or employee, situation brought difficulties regarding how social security system can help each one. this paper main focus will be on impact pandemic with strong accent unemployment benefits and statistics imm...

2004
Kalyan Veeramachaneni Lisa Ann Osadciw Pramod K. Varshney

This paper presents an evolutionary approach to the sensor management of a biometric security system that improves robustness. Multiple biometrics are fused at the decision level to support a system that can meet more challenging and varying accuracy requirements as well as address user needs such as ease of use and universality better than a single biometric system or static multimodal biometr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید