نتایج جستجو برای: especially security needs
تعداد نتایج: 778134 فیلتر نتایج به سال:
increasing academic and professional language demands around the world are not a deniable fact. the purpose of this study was to investigate english language needs and communication needs of the chemistry students at master and ph.d. levels at the iranian universities. in this research, different methods were used including un-structured interview, structured interview, and two sets of question...
Security of transferring data through channels has lots of concern especially if the transferred data is important. In stereo images, the scene is reconstructed from pair of images; the resulting is the 3D information which in some applications needs to be transferred through insecure channel. The security is important to protect the data from eavesdropping. We have proposed novel technique to ...
We propose a new component model with a focus on the needs of Internet components, mainly dynamism and security. It is based around the concept of a cell—a new programming abstraction with component-specific responsibilities. At the heart of it is the introduction of a persistent link mode of interaction into components. In existing technologies (COM/Corba/Java Beans), components interact exclu...
In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain information could have detrimental effects when it ends up in wrong hands. For this reason, any would-be partici...
As the number and size of the Network increases, the deficiencies persist, including network security problems. But there is no shortage of technologies offered as universal remedy – EIGRP,BGP, OSPF, VoIP, IPv6, IPTV, MPLS, WiFi, to name a few. There are multiple factors for the current situation. Now a day during emergent and blossoming stages of network development is no longer sufficient whe...
Multi-receiver public key encryption is important in insecurity and open network environment and has been applied in many scenarios such as first pay television system, streaming media services and so on. To avoid costly management of certificate and settle the matter of key escrow, we combine multi-receiver public key encryption with certificateless cryptography, and then present the notion, s...
This book describes how to use biometric features such as finger prints or iris patterns to construct private keys for cryptography. It is a very interesting topic, as, nowadays, cryptographic protocols can store/produce thousands of bits of secure information, while the user needs a password to make the exchange secure. The major weakness in a cryptographic protocols is the user himself. Biome...
Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia School of Business Information Technology, Kookmin University, Korea [e-mail: [email protected], [email protected], [email protected], [email protected]] ABSTRACT: Today, usage of mobile ad hoc networks (MANET) has become favorable research subject of study due to their flexibility, mobility and se...
Objective: The purpose of this study is to present and analyze a model according to which the prediction of job satisfaction based on self-efficacy beliefs, teacher's sense of efficacy, job stress and hierarchy of needs in exceptional children's teachers is investigated. Method: To do this, 165 subjects (99 females and 66 males) among the exceptional children's teachers of elementary gr...
This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید