نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

Journal: :فقه و اصول 0

fundamentals of legal rule is one of the major discourses of the philosophy of law, which has led to the formation of numerous intellectual schools in this field. the main query of the present research is that whether the two schools of “natural law” and “legal positivism” can interact with each other. is the combination of “value” and “reality” possible in a legal system? what is the status of...

2012
Max Schuchard Christopher Thompson Nicholas Hopper Yongdae Kim

In this work, we examine how an adversary in control of a BGP speaker in a transit AS can cause a victim router in an arbitrary location on the Internet to become unstable. Through experimentation with both hardware and software routers, we look at the behavior of routers under abnormal conditions and come to four conclusions. First, routers placed in certain states behave in anything but a sta...

Journal: :مطالعات حقوق خصوصی 0
کمال الدین هریسی نژاد دانشگاه تهران

due to the british hegemony of iran in both pre- and post-constitutional revolutionary periods (1906-1911), the iranian legal system was expected to be influenced by british common law following the establishment of the modern government after the revolution. but it did not happen for various legal and non-legal reasons. a major legal reason could be iranians’ long history of acquaintance with ...

Journal: :CoRR 2010
Stevens Le Blond Arnaud Legout Fabrice Le Fessant Walid Dabbous Mohamed Ali Kâafar

This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We sho...

Journal: :IEEE Transactions on Information Forensics and Security 2009

2015
Sheung Chi Chan Keith Mayes

Nowadays, smart card has already been adopted in many public transport ticketing system. This make the security and mutual authentication of the card and reader becomes an important factor to consider. In order to prove the security level and the security properties needed in the communication, formal symbolic adversaries modelling approach are analysed and illustrated in this project and a new...

Journal: :British Dental Journal 2013

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1393

the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده حقوق 1389

چکیده ندارد.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید