نتایج جستجو برای: and at last electronic signatures certification service
تعداد نتایج: 17220170 فیلتر نتایج به سال:
The growing role of mobile devices in previously face to face interactions presents new domains for cryptographic applications. At the same, time the increased role of digital systems raises new security and privacy issues. With some thirty thousand notifications sent, inSPOT.org’s electronic notification of exposure to sexually transmitted infections is one such concerning development. This pa...
increasing academic and professional language demands around the world are not a deniable fact. the purpose of this study was to investigate english language needs and communication needs of the chemistry students at master and ph.d. levels at the iranian universities. in this research, different methods were used including un-structured interview, structured interview, and two sets of question...
Business transactions in an electronic service market are expected to appear spontaneously, anonymously, and with varying requirements of infrastructural support. This support generally covers security requirements such as authentication, privacy, and public key certification as well as payment protocols or the demand for notary services. The latter two aspects are considered in particular in t...
the present study aimed at exploring cognitions of iranian english teachers within the context of english for academic purposes (eap). to this end, the cognitions of two groups of eap teachers with respect to their pedagogical content knowledge (pck) and their sense of professional identity (pi) were probed. two language teachers and two content instructors who had at least five years of eap te...
Public key infrastructure (PKI) has emerged as a critical technology for identity management in e-commerce and e-government and over a hundred Certification Authorities across the globe offer certification services. Despite the passing of legislation in many countries to give equal legal weight to electronic signatures as to handwritten ones, the overall market for digital certificates has not ...
abstract: research purpose: the purpose of this research is to identify academic databases assessment factors and criteria at law and political science majors. the necessity of this research is to distinguish academic databases assessment factors and criteria and to identify the most important ones and rank them in order to select an appropriate database according to students’ and faculty memb...
A novel operational policy, the Process Intermediate Storage operational policy, is introduced and used to synthesize, schedule and design multipurpose batch plants. The model is based on the State Sequence Network and non-uniform discretization of the time horizon of interest model developed by Majozi and Zhu [Majozi, T., Zhu, X. (2001). A novel continuous-time MILP formulation for multipurpos...
Against the background of the regulation 2014/910/EU [EU1] on electronic identification (eID) and trusted services for electronic transactions in the internal market (eIDAS), the FutureTrust project, which is funded within the EU Framework Programme for Research and Innovation (Horizon 2020) under Grant Agreement No. 700542, aims at supporting the practical implementation of the regulation in E...
the rise and stublishment of safavid dynasty was depend on triangle of tasavof, tashayo and royalty, kings legitimized their power upon these. therefore for the understanding the functions of that period we must explore the role of this elements. although application and emphsise upon dignities such as; complete mentor (morshede kamel), deputy of absent imam (nayebe imame ghayeb), and god’s sha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید