نتایج جستجو برای: unauthorized tissues
تعداد نتایج: 198978 فیلتر نتایج به سال:
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some case...
BACKGROUND Shortly after the approval of an over-the-counter HIV self-test in the US, we conducted a study to estimate the proportion of men who have sex with men (MSM) in Spain who knew that unauthorized HIV self-tests could be purchased online, and the proportion that had already used these tests, as well as their socio-demographic and behavioural correlates. METHODS Between September 2012 ...
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts c...
The paper explores a framework combining remote sensing and GIS-cellular automata (CA) concepts aimed at improving the modeling of unauthorized land use sprawl. Remote sensing data have been used in urban modeling and analysis, the use of high-resolution remote sensing data in assessing unauthorized development is quite unexplored. This work has demonstrated systematic combination utilization o...
More than two-thirds of the unauthorized immigrant population—roughly 8 million out of 11.2 million—is in our nation’s workforce, and growing evidence suggests that unauthorized workers are more likely than their authorized counterparts to experience workplace-related violations. Although scholars have begun shifting their focus to the agencies empowered to regulate immigrants in the workplace,...
Distributed web services are under constant threat of being attacked from nodes, internal or external to the system. Internal attacks may result from hijacking of trusted web servers, resulting in loss/corruption of information, and Denial of Service (DoS) to clients. External attacks can occur from hijacking of trusted clients or malicious nodes leading to DoS to clients. The paper focuses on ...
RFID systems are becoming increasingly ubiquitous in both public and private domains. However, due to the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise due to the tag’s promiscuous response to any reader requests. This renders sensitive tag information easily su...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید