نتایج جستجو برای: family security

تعداد نتایج: 593459  

Journal: :International journal of qualitative studies on health and well-being 2016
Liselott Årestedt Eva Benzein Carina Persson Margareta Rämgård

Living with chronic illness is a family affair that involves ongoing changes and challenges in everyday life. When life changes, the environment is important for family health and well-being. The relation between a place and a family is rarely described, and therefore the aim of this study was to explore the meaning of place for family well-being in families living with chronic illness. A quali...

2004
Stephen D. Wolthusen

This paper summarizes existing and describes ongoing work on securit ypolicy definition and particularly enforcement in heterogeneous distributed systems. Based on a formal model of operating systems and interactions among networked nodes in a distributed system axiomatizing relations among and abstractions in distributed systems, arbitrary security policies can be defined over the same model; ...

2012
Manoranjan Mohanty

Social security and social protection concepts are gaining importance, especially in the Pacific Island countries (PICs). The state-led welfare and social protection system is limited in PICs, where there has been a heavy reliance on traditional, informal and non-state social protection systems which are provided through extended family, kinship, and community. The aim of the paper is to examin...

Journal: :Archives of disease in childhood 1992
C Dare

The psychological health and the normal course of development of a child are closely determined by the nature of the security, predictability, and appropriateness of the immediate social environment. For most children, in Western postindustrial culture, this environment centres upon the nuclear family. Over the last four decades there has evolved a psychotherapeutic intervention that takes fami...

Journal: :Child development 2000
E Waters N S Weinfield C E Hamilton

For over three decades, critics of the developmental and psychometric paradigms have argued that individual differences are neither stable, coherent, nor clinically significant. The present studies extend a long line of research demonstrating the coherence of individual development in attachment security. They make it clear that attachment security can be stable from infancy through early adult...

2010
Bangdao Chen A. W. Roscoe Ronald Kainda Long Hoang Nguyen

A new family of protocols, based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. These protocols are particularly suitable for authentication on mobile phones where PKI or trusted third party solutions are not practical to cover all scenarios. Rather, individuals are able to hook up devices in their possessio...

Journal: :RFC 2005
Roy Arends Rob Austein Matt Larson Dan Massey Scott Rose

This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requireme...

Journal: :IACR Cryptology ePrint Archive 2007
Markku-Juhani O. Saarinen

In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory problem with hard average-case complexity. In the ECRYPT 2007 Hash Function Workshop, new versions with essentially the same compression function but radically different security parameters and an additional final transformation w...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده کشاورزی 1390

به منظور مطالعه‏ی تنوع گونه‏ای کنه‏های خاکزی خانواده ascidae و laelapidae از راسته‏ی میان‏استیگمایان، در شهرستان شهرضا از اواخر زمستان 1388 تا اواخر تابستان 1390 نمونه‏برداری از خاک انجام شد. در جریان این بررسی، 24 گونه از کنه‏های خانواده‏های مذکور جمع‏آوری و شناسایی شدند. از این تعداد، سه گونه برای جهان و دو گونه برای ایران جدید می‏باشند. گونه‏هایی که با علامت یک و دو ستاره مشخص شده‏اند به ترت...

2015
Denis Butin Stefan-Lukas Gazdag Johannes A. Buchmann

Digital signatures are ubiquitous in modern security infrastructures. Their lack of diversity in industrial settings makes most contemporary systems susceptible to quantum computer-aided attacks. Alternatives exist, among which a family of well-understood schemes with minimal security requirements: hash-based signatures. In addition to being quantum-safe, hash-based signatures are modular, prov...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید