نتایج جستجو برای: especially security needs

تعداد نتایج: 778134  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده علوم انسانی 1390

increasing academic and professional language demands around the world are not a deniable fact. the purpose of this study was to investigate english language needs and communication needs of the chemistry students at master and ph.d. levels at the iranian universities. in this research, different methods were used including un-structured interview, structured interview, and two sets of question...

2012
Osama Hosam

Security of transferring data through channels has lots of concern especially if the transferred data is important. In stereo images, the scene is reconstructed from pair of images; the resulting is the 3D information which in some applications needs to be transferred through insecure channel. The security is important to protect the data from eavesdropping. We have proposed novel technique to ...

2001
Ran Rinat Scott F. Smith

We propose a new component model with a focus on the needs of Internet components, mainly dynamism and security. It is based around the concept of a cell—a new programming abstraction with component-specific responsibilities. At the heart of it is the introduction of a persistent link mode of interaction into components. In existing technologies (COM/Corba/Java Beans), components interact exclu...

Journal: :CoRR 2014
Nalin Asanka Gamagedara Arachchilage Cornelius Namiluko Andrew P. Martin

In any given collaboration, information needs to flow from one participant to another. While participants may be interested in sharing information with one another, it is often necessary for them to establish the impact of sharing certain kinds of information. This is because certain information could have detrimental effects when it ends up in wrong hands. For this reason, any would-be partici...

Journal: :CoRR 2009
Ram Kumar Singh T. Ramajujam

As the number and size of the Network increases, the deficiencies persist, including network security problems. But there is no shortage of technologies offered as universal remedy – EIGRP,BGP, OSPF, VoIP, IPv6, IPTV, MPLS, WiFi, to name a few. There are multiple factors for the current situation. Now a day during emergent and blossoming stages of network development is no longer sufficient whe...

2016
Jun Zhu Lin-Lin Chen Xian Zhu Ling Xie

Multi-receiver public key encryption is important in insecurity and open network environment and has been applied in many scenarios such as first pay television system, streaming media services and so on. To avoid costly management of certificate and settle the matter of key escrow, we combine multi-receiver public key encryption with certificateless cryptography, and then present the notion, s...

2013
Pim Tuyls Boris Skoric Tom Kevenaar Nadia El Mrabet

This book describes how to use biometric features such as finger prints or iris patterns to construct private keys for cryptography. It is a very interesting topic, as, nowadays, cryptographic protocols can store/produce thousands of bits of secure information, while the user needs a password to make the exchange secure. The major weakness in a cryptographic protocols is the user himself. Biome...

2013
Mojtaba GhanaatPisheh Sanaei Imran Ghani Aida Hakemi Seung Ryul Jeong

Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia School of Business Information Technology, Kookmin University, Korea [e-mail: [email protected], [email protected], [email protected], [email protected]] ABSTRACT: Today, usage of mobile ad hoc networks (MANET) has become favorable research subject of study due to their flexibility, mobility and se...

Objective: The purpose of this study is to present and analyze a model according to which the prediction of job satisfaction based on self-efficacy beliefs, teacher's sense of efficacy, job stress and hierarchy of needs in exceptional children's teachers is investigated. Method: To do this, 165 subjects (99 females and 66 males) among the exceptional children's teachers of elementary gr...

2011
Christian Gehrmann Jacob Löfvenberg

This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید