نتایج جستجو برای: family security
تعداد نتایج: 593459 فیلتر نتایج به سال:
We present a new family of public-key encryption schemes which combine modest computational demands with provable security guarantees under only general assumptions. The schemes may be realized with any one-way trapdoor permutation, and provide a notion of security corresponding to semantic security under the condition that the message space has sufficient entropy. Furthermore, these schemes ca...
Background & Aims: Food security is one of the major challenges for socioeconomic programs in the communities. The number of food-insecure people in the 70 lowest-income countries rose from 849 million to 982 million between 2006 and 2007 in the world. The purpose of this study was to determine the prevalence of household food insecurity and its influencing factors.Materials &Methods: This cro...
Over the past several years, we have seen the emergence of new paradigm in the Internet, online social media networking, which provide Internet users to communicate and collaborate with family, friends, social groups, and other community by using social media tools (i.e., Twitter, Facebook, MySpace, and Youtube). The use of social media for communication is becoming more prevalent worldwide, wi...
Sequences are critical for anti-jamming and security in spread spectrum communications networks. The complexity to break sequence is measured by linear span of sequence. The linear span of a sequence is the lowest degree of the characteristic polynomials that can generate the sequence. A new family of sequences with optimal correlation properties is constructed for the generalized Kasami set. A...
Radio Frequency Identification (RFID) has received recently a great attention from large organizations and researchers due to the dropping tag costs and vigorous RFID standardization. They are becoming more common in daily use to identify, locate and track people, assets, and animals. Number of protocols has been proposed in the literature for the security of RFID against passive attacks. One o...
The secure authentication mechanism most widely deployed and used by Internet application protocols is the transmission of clear-text passwords over a channel protected by Transport Layer Security (TLS). There are some significant security concerns with that mechanism, which could be addressed by the use of a challenge response authentication mechanism protected by TLS. Unfortunately, the chall...
In this paper, we propose a guess and determine attack against some variants of the π-Cipher family of authenticated ciphers. This family of ciphers is a second-round candidate of the CAESAR competition. More precisely, we show a key recovery attack with time complexity little higher than 2, and low data complexity, against variants of the cipher with ω-bit words, when the internal permutation ...
GlobalPlatform (GP) card specifications are the de facto standards for the industry of smart cards. Being highly sensitive, GP specifications were defined regarding stringent security requirements. In this paper, we analyze the cryptographic core of these requirements; i.e. the family of Secure Channel Protocols (SCP). Our main results are twofold. First, we demonstrate a theoretical attack aga...
Addressing a gap in process-oriented understanding of relations between marital conflict and children’s adjustment, propositions of the emotional security hypothesis from a family-wide perspective were tested in a longitudinal research design. Participants were 181 families and their 11–12 year-old-child (115 boys, 76 girls) living in Wales, in the United Kingdom. Relations between marital conf...
The Emotional Security Theory (EST) was originally developed to investigate the association between high levels of interparental conflict and child maladaptative outcome. The objective of the present study was to analyze the effects of emotional security in the family system on psychological distress among a sample of young female adult survivors of child sexual abuse (CSA). The role of emotion...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید