نتایج جستجو برای: and at last electronic signatures certification service

تعداد نتایج: 17220170  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1388

abstract following innovations in the field of elt, a new topic which has recently attracted a lot of attention is metaphor analysis. although this area of research is still in its infancy in elt, it seems that the idea can shed more light on the puzzle of english language learning and teaching. therefore, the major aim of this study is to analyze language learning and teaching in formal a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

chapter two presents three m-admissible function algebras ab, bd, and sl, to construct the universal abelian, band, and semilattice compactifications, respectively. the main results are (11.3), (12.3), and (12.4). some inclusion relationships between these function algebras and the other well-known ones, presented in section 8, are made via the devico of compactifications. chpter three is about...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده علوم تربیتی و روانشناسی 1388

چکیده هدف اصلی این پژوهش تعیین رابطه استراتژیهای خود رهبری و خلاقیت اعضای هیات علمی دانشگاه علم و صنعت بوده است. در این پژوهش از روش توصیفی از نوع همبستگی استفاده شده است. جامعه آماری پژوهش کلیه اعضای هیات علمی دانشگاه علم و صنعت در سال تحصیلی 88-1387 بود که بالغ بر345 نفربودندو از این تعداد، 119 نفر استاد با استفاده از روش نمونه گیری تصادفی طبقه ای متناسب با حجم انتخاب شد. ابزار جمع آوری داده...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده ادبیات و علوم انسانی 1393

from its emergence till present time marxist principles has undergone great changes since their promulgation by marx. many theorists and thinkers set at rectifying marxist tenets and introducing those of their own while others advocated its main concepts and attempted at improving them. among marxist philosophers who had an intensive study of marxs ideology, is louis althusser whose reflections...

1997
Denis Trèek

Various kinds of digital commerce depend on digital signatures, which are based on public-key cryptography and one-way hash functions. However, one-way hash functions have properties, which can be exploited to subvert security service. A framework in this paper gives a way to minimise such risks with paying attention to proper structuring (and consequently coding) of electronic documents and th...

2013
Klaus Stranacher Vesna Krnjic Thomas Zefferer

The public sector holds large amounts of data of various areas such as social affairs, economy, or tourism. Various initiatives such as Open Government Data or the EU Directive on public sector information aim to make these data available for public and private service providers. Requirements for the provision of public sector data are defined by legal and organizational frameworks. Surprisingl...

2012
Omer Berkman Benny Pinkas Moti Yung

Clients trust servers over the Internet due to their trust in digital signatures of certification authorities (CAs) which comprise the Internet’s trust infrastructure. Based on the recent DigiNotar attack and other attacks on CAs, we formulate here a very strong attack denoted “Certificate in The Middle” (CiTM) and propose a mitigation for this attack. The solution is embedded in a handshake pr...

Journal: :تحقیقات بازاریابی نوین 0
behzad hakiminya amirhasan kamali sarvestani mahboobe mahboobe sadeghzadeh tabrizi mojtaba saeidizadeh

the increasing growth and development of communications technology has created a major change indifferent aspects of human life and organizational performance. new technologies have changed function and attitudes of individuals and organizations and have become an important aspect in creating new jobs and innovation in organizations. development of new phenomena such as electronic business, ele...

2010
Bernhard Beckert Daniel Grahl Sarah Grebing

It is a common belief that the rise of standardized software certification schemes like the Common Criteria (CC) would give a boost to formal verification, and that software certification may be a killer application for program verification. However, while formal models are indeed used throughout high-assurance certification, verification of the actual implementation is not required by the CC a...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

august wilson is undoubtedly one of the rare black playwrights whose works have attracted streams of attention and worldwide audience. the present study aims at analyzing fences and piano lesson which are two of the most successful plays in his pittsburgh cycle from the perspective of michel foucault’s theories and ideas. studying these two plays from foucault’s perspective opens new windows in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید