نتایج جستجو برای: compromising approach

تعداد نتایج: 1299112  

Journal: :İktisat İşletme ve Finans 2008

Journal: :International Journal of Computer Science and Information Technology 2019

2008
Vasilis Pappas Elias Athanasopoulos Sotiris Ioannidis Evangelos P. Markatos

We present a novel attack targeting anonymizing systems. The attack involves placing a malicious relay node inside an anonymizing system and keeping legitimate nodes “busy.” We achieve this by creating circular circuits and injecting fraudulent packets, crafted in a way that will make them spin an arbitrary number of times inside our artificial loops. At the same time we inject a small number o...

2005
Markus G. Kuhn

Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanations of digital electronics. The nature of these emissions has changed with evolving technology; electromechanic devices have vanished and signal frequencies increased several orders of magnitude. Recently published eaves...

2005

This paper looks at two theories of polarity licensing that utilize a downward entailment relation (DE) in their explanations of the polarity item distribution question. I illustrate that various compromising adverbs such as pretty much, virtually, practically, basically, etc., disrupt downward entailment yet do not interfere with polarity licensing, which raises problems for theories depending...

Journal: :IEEE Transactions on Electromagnetic Compatibility 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید