نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

Journal: :CoRR 2012
Yordan Kalmukov

The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a ...

Journal: :Journal of law and health 1995
Thomas Lundmark

2006
Matthew P. Martens Richard F. Haase

(this article cites 46 articles hosted on the Citations use or unauthorized distribution.

Journal: :Ad Hoc Networks 2012
Song Liu Larry J. Greenstein Wade Trappe Yingying Chen

1570-8705/$ see front matter 2011 Published b doi:10.1016/j.adhoc.2011.04.003 ⇑ Corresponding author. E-mail addresses: [email protected] ( rutgers.edu (L.J. Greenstein), [email protected] [email protected] (Y. Chen). Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that access spectrum resources in a ...

Journal: :Digital Evidence and Electronic Signature Law Review 2014

2003
Simon Byers Lorrie Faith Cranor Dave Korman Patrick McDaniel

Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some case...

Journal: :Journal of Management 2021

Focusing on the organizing practices by which vulnerable individuals are exploited for their labor, we build a model that depicts how human traffickers systematically target impoverished girls and women transform autonomous objection into unquestioned compliance. Drawing from qualitative interviews with forced labor in sex industry, traffickers, brothel managers, other sources (e.g., doctors, n...

2016
Konstantinos Koutentakis María Elena Rosales-Statkus Juan Hoyos Sonia Fernández-Balbuena Mónica Ruiz Cristina Agustí Luis de la Fuente María José Belza

BACKGROUND Shortly after the approval of an over-the-counter HIV self-test in the US, we conducted a study to estimate the proportion of men who have sex with men (MSM) in Spain who knew that unauthorized HIV self-tests could be purchased online, and the proportion that had already used these tests, as well as their socio-demographic and behavioural correlates. METHODS Between September 2012 ...

2018
Yongjian Liao Yichuan He Fagen Li Shaoquan Jiang Shijie Zhou

Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید