نتایج جستجو برای: secured

تعداد نتایج: 6557  

Journal: :IET Microwaves, Antennas & Propagation 2016

Journal: :SSRN Electronic Journal 2002

Journal: :The Laryngoscope 2010
Timothy B Molony Jerald E Giles T Luke Thompson Kevin K Motamedi

OBJECTIVES/HYPOTHESIS To compare complication rates between patients whose cochlear implants were secured by a bony tie-down technique versus those secured by a periosteal tie-down technique. STUDY DESIGN A retrospective review of 302 consecutive patients undergoing cochlear implantation (327 implants), including both adults and children, at a single institution by a single surgeon. METHODS...

2000
Mukesh K. Mohania Vijay Kumar Yahiko Kambayashi Bharat K. Bhargava

In ‘this paper we discuss various secured web access schemes using dynamic and static approaches. In a static approach the access environment, that is, set of authorized users, the mode of access, their access rights, etc., are predefined. This approach is suitable only for a static set up where the user requirements do not change frequently. In the dynamic approach, on the other hand, the auth...

Journal: :SSRN Electronic Journal 1999

Journal: :International Journal of Computer Applications 2018

Journal: :Research Journal of Information Technology 2013

Journal: :CoRR 2017
E. O. Kiktenko N. O. Pozhar M. N. Anufriev A. S. Trushechkin R. R. Yunusov Y. V. Kurochkin A. I. Lvovsky A. K. Fedorov

E.O. Kiktenko, 2 N.O. Pozhar, M.N. Anufriev, A.S. Trushechkin, 2 R.R. Yunusov, Y.V. Kurochkin, A.I. Lvovsky, 3 and A.K. Fedorov 4 Russian Quantum Center, Skolkovo, Moscow 143025, Russia Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia Institute for Quantum Science and Technology, University of Calgary, Calgary AB T2N 1N4, Canada LPTMS, CNRS, Univ. Paris-Sud, ...

2015
Evangelos Kranakis Douglas A. Stinson

Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. There are various types of algorithms available for encryption and decryption of data and new algorithms are evolving. Polyalphabetic sub...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید