نتایج جستجو برای: family security

تعداد نتایج: 593459  

Journal: :IACR Cryptology ePrint Archive 2001
Alexander Russell Hong Wang

We present a new family of public-key encryption schemes which combine modest computational demands with provable security guarantees under only general assumptions. The schemes may be realized with any one-way trapdoor permutation, and provide a notion of security corresponding to semantic security under the condition that the message space has sufficient entropy. Furthermore, these schemes ca...

دستگیری, سعید, شرفخانی, رحیم, قره آغاجی اصل, رسول, قوام زاده, سعید,

 Background & Aims: Food security is one of the major challenges for socioeconomic programs in the communities. The number of food-insecure people in the 70 lowest-income countries rose from 849 million to 982 million between 2006 and 2007 in the world. The purpose of this study was to determine the prevalence of household food insecurity and its influencing factors.Materials &Methods: This cro...

2012
Hak J. Kim

Over the past several years, we have seen the emergence of new paradigm in the Internet, online social media networking, which provide Internet users to communicate and collaborate with family, friends, social groups, and other community by using social media tools (i.e., Twitter, Facebook, MySpace, and Youtube). The use of social media for communication is becoming more prevalent worldwide, wi...

Journal: :IEICE Transactions 2008
Xiangyong Zeng John Q. Liu Lei Hu Desmond P. Taylor

Sequences are critical for anti-jamming and security in spread spectrum communications networks. The complexity to break sequence is measured by linear span of sequence. The linear span of a sequence is the lowest degree of the characteristic polynomials that can generate the sequence. A new family of sequences with optimal correlation properties is constructed for the generalized Kasami set. A...

2013
S. A. Ali M. Hardan

Radio Frequency Identification (RFID) has received recently a great attention from large organizations and researchers due to the dropping tag costs and vigorous RFID standardization. They are becoming more common in daily use to identify, locate and track people, assets, and animals. Number of protocols has been proposed in the literature for the security of RFID against passive attacks. One o...

Journal: :RFC 2010
Chris Newman Abhijit Menon-Sen Alexey Melnikov Nicolas Williams

The secure authentication mechanism most widely deployed and used by Internet application protocols is the transmission of clear-text passwords over a channel protected by Transport Layer Security (TLS). There are some significant security concerns with that mechanism, which could be addressed by the use of a challenge response authentication mechanism protected by TLS. Unfortunately, the chall...

2016
Christina Boura Avik Chakraborti Gaëtan Leurent Goutam Paul Dhiman Saha Hadi Soleimany Valentin Suder

In this paper, we propose a guess and determine attack against some variants of the π-Cipher family of authenticated ciphers. This family of ciphers is a second-round candidate of the CAESAR competition. More precisely, we show a key recovery attack with time complexity little higher than 2, and low data complexity, against variants of the cipher with ω-bit words, when the internal permutation ...

Journal: :IACR Cryptology ePrint Archive 2016
Mohamed Sabt Jacques Traoré

GlobalPlatform (GP) card specifications are the de facto standards for the industry of smart cards. Being highly sensitive, GP specifications were defined regarding stringent security requirements. In this paper, we analyze the cryptographic core of these requirements; i.e. the family of Secure Channel Protocols (SCP). Our main results are twofold. First, we demonstrate a theoretical attack aga...

2004
Gordon T. Harold Katherine H. Shelton Marcie C. Goeke-Morey Mark Cummings

Addressing a gap in process-oriented understanding of relations between marital conflict and children’s adjustment, propositions of the emotional security hypothesis from a family-wide perspective were tested in a longitudinal research design. Participants were 181 families and their 11–12 year-old-child (115 boys, 76 girls) living in Wales, in the United Kingdom. Relations between marital conf...

Journal: :Child abuse & neglect 2016
David Cantón-Cortés José Cantón María Rosario Cortés

The Emotional Security Theory (EST) was originally developed to investigate the association between high levels of interparental conflict and child maladaptative outcome. The objective of the present study was to analyze the effects of emotional security in the family system on psychological distress among a sample of young female adult survivors of child sexual abuse (CSA). The role of emotion...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید