نتایج جستجو برای: keywords human security

تعداد نتایج: 3647114  

2015
Navita Kamboj Preeti Gupta

With an increasing emphasis on security, Iris recognition has gained a great attention in both research and practical applications over the past decade. The demand for iris recognition in the various fields of access control reducing fraudulent transactions in electronic commences, security at border areas etc is increasing day by day due to its high accuracy, reliability and uniqueness. It is ...

2012
Gunjan Gupta Rama Chawla

With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...

2002
Bryan Baker

Keywords: Capital asset pricing model (Capm) Capital asset pricing theory Finance theory Hedonic pricing Portfolio theory Residential rental real estate investment (RRREI) Security market line Systematic/unsystematic risk

Journal: :IJDSN 2012
Ana Lucila Sandoval Orozco Julián García Matesanz L. Javier García-Villalba José Duván Márquez Díaz Tai-Hoon Kim

In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Owe to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. We first analyse the main vulnerabilities in the mobile ad hoc networks, which have made it much easier to suffer from attacks than the traditional wired network. The...

Journal: :IACR Cryptology ePrint Archive 2017
Tsunekazu Saito Keita Xagawa Takashi Yamakawa

We give a rst tight security reduction for a conversion from a weaklysecure public-key encryption scheme to an IND-CCA-secure key-encapsulation mechanism scheme in the quantum random oracle model. To the best of our knowledge, previous reductions are non-tight as the security levels of the obtained schemes are degraded to at most half or quater of the original security level (Boneh, Dagdelen, F...

2012
Andra Pradesh

The Wireless Sensor Network (WSN) increasingly becoming more practicable solution to many challenging applications. One of the major applications of the sensor networks is in military. So providing security is particularly challenging and its security mechanisms are also be the greatest concern to deploy sensor network such hostile unattended environments, monitoring real world applications. In...

2012
Maneesha Sharma Himani Bansal Amit Kumar Sharma

Cloud computing has generated a lot of interest and competition in the industry and it is recognize as one of the top 10 technologies of 2010. It is an internet based service delivery model which provides internet based services, computing and storage for users in all market including financial, health care & government. In this paper we did systematic review on different types of clouds and th...

Journal: :CoRR 2018
Engin Sahin Ihsan Yilmaz

In this study, the security of Novel Enhanced Quantum Representation (NEQR) of quantum images are suggested by using the Quantum Fourier Transform (QFT ) with blind trent. In the protocol, QFT and keys are used to share signature with recipients. So all members know only their signature information which are encrypted output of the QFT . This improves the security of the protocol. In addition, ...

Journal: :Review of Human Rights 2019

Journal: :Australasian Review of African Studies 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید