نتایج جستجو برای: secured

تعداد نتایج: 6557  

Journal: :IEICE Transactions 2005
Paul Vixie

The DNSSECbis data model has key introduction follow the delegation chain, thus requiring a zone’s parent to become secure before a zone itself can be secured. Ultimately this leads to non-deployability since the root zone will probably not be secured any time soon. We describe an early deployment aid for DNSSECbis whereby key introduction can be done via cooperating third parties. key words: D...

Journal: :EURASIP J. Wireless Comm. and Networking 2009
Ali Al Shidhani Victor C. M. Leung

Interworking Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Networks (WLANs) introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS) of t...

2014
Wei Zhang

INTRODUCTION ........................................................................................... 790 I. NONADJUSTING CREDITORS AND THE DISTRIBUTIONAL EFFECTS OF SECURITY INTERESTS ................................................................. 793 A. Distributional Effects of Secured Debt .................................... 793 B. Presence of Nonadjusting Creditors .....................

2003
G. Richard Y. Menguy I. Guis P. Lockwood

This paper presents a typical application of secured access to a terminal and/or teleservices using biometrics (speech and frontal face) verification. This application is one of the prototype developed in the European ACTS project « M2VTS » which stands for Multi Modal Verification for Teleservices and Security Applications. The primary goal of this project was to address the issue of secured a...

2015
Rani Dhivya

Nowadays secured data sharing is a challenging process in cloud computing. This paper is to implement the secured data sharing in the online health communities. These online health communities continue to offer huge variety of medical information useful for medical practioners, system administrator and patients alike. In this paper the doctors and patients gets interact with each other. The pat...

2015
Saumya Bhadauria Anirban Sengupta Prasun Ghosal Shiyan Hu Helen Li

Multi-cycle single event transient (SET) fault security aware multi-objective (MO)-DSE for single loop CDFGs during behavioral synthesis has not received significant attention in the literature yet. Solving the aforesaid problem in the context of Control Data Flow Graph (CDFG) is non-trivial as it involves simultaneous generation of an optimal combination of multi-cycle fault secured datapath a...

Journal: :مجله علوم اعصاب شفای خاتم 0
fatemeh alipour shefa neuroscience research center, khatam alanbia hospital, tehran, iran

children under 3 years of age must not travel in a car or goods vehicle (other than a taxi) unless restrained in the correct child seat. children aged 3 years or over who are under 150 cm in height and weighing less than 36 kilograms must use the correct child seat, booster seat or booster cushion. rearward-facing child car seats must never be used in the front passenger seat of cars with an ac...

2016
Kaipa Swetha

Data Mining has wide use in many fields such as financial, medication, medical research and among govt. departments. Classification is one of the widely applied works in data mining applications. For the past several years, due to the increase of various privacy problems, many conceptual and realistic alternatives to the classification issue have been suggested under various protection designs....

2016
Shaila Ghanti G M Naik

Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید