نتایج جستجو برای: secure
تعداد نتایج: 56843 فیلتر نتایج به سال:
in mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.since all nodes in the manets would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. so evaluating the perf...
the main purpose of this research was 10 study the relationship between attachment styles (secure. avoidant, ambivalent) and personality dimensions (neuroticism. extraversion, openness, agreeableness. consciousness) . two hundred and thirty three students ( 102 male. 131 female ) from the university of tehran participated in this study . adult attachment inventory (aai) was applied for measurin...
Objective: Current challengeable life, faces young with varied damages. The Purpose of this research was appointment of role of attachment styles in the risky behaviors of students. Method: the method of the project was attachment in descriptive ones. 273 people of students were selected via several stage cluster sample, and answered to questionner of adult attachment and risky behaviors. Resu...
in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...
The attachment styles are the basis of a healthy family. Therefore, the purpose of this study was to predict family function and quality of life according to the attachment styles among couples of Shiraz. The research method is correlation. The statistical population of this study was all couples married in Shiraz in the year of (1396-97) who were selected by random sampling method. Epstein, Bi...
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید