نتایج جستجو برای: and at last electronic signatures certification service

تعداد نتایج: 17220170  

2012
Ian Miers Matthew Green Christoph U. Lehmann Aviel D. Rubin

The growing role of mobile devices in previously face to face interactions presents new domains for cryptographic applications. At the same, time the increased role of digital systems raises new security and privacy issues. With some thirty thousand notifications sent, inSPOT.org’s electronic notification of exposure to sexually transmitted infections is one such concerning development. This pa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده علوم انسانی 1390

increasing academic and professional language demands around the world are not a deniable fact. the purpose of this study was to investigate english language needs and communication needs of the chemistry students at master and ph.d. levels at the iranian universities. in this research, different methods were used including un-structured interview, structured interview, and two sets of question...

1996
M. Merz T. Tu W. Lamersdorf

Business transactions in an electronic service market are expected to appear spontaneously, anonymously, and with varying requirements of infrastructural support. This support generally covers security requirements such as authentication, privacy, and public key certification as well as payment protocols or the demand for notary services. The latter two aspects are considered in particular in t...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

the present study aimed at exploring cognitions of iranian english teachers within the context of english for academic purposes (eap). to this end, the cognitions of two groups of eap teachers with respect to their pedagogical content knowledge (pck) and their sense of professional identity (pi) were probed. two language teachers and two content instructors who had at least five years of eap te...

2003
James Backhouse Carol Hsu John Baptista Jimmy Tseng

Public key infrastructure (PKI) has emerged as a critical technology for identity management in e-commerce and e-government and over a hundred Certification Authorities across the globe offer certification services. Despite the passing of legislation in many countries to give equal legal weight to electronic signatures as to handwritten ones, the overall market for digital certificates has not ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم تربیتی و روانشناسی 1391

abstract: research purpose: the purpose of this research is to identify academic databases assessment factors and criteria at law and political science majors. the necessity of this research is to distinguish academic databases assessment factors and criteria and to identify the most important ones and rank them in order to select an appropriate database according to students’ and faculty memb...

Journal: :Computers & Chemical Engineering 2010
Thomas Pattinson Thokozani Majozi

A novel operational policy, the Process Intermediate Storage operational policy, is introduced and used to synthesize, schedule and design multipurpose batch plants. The model is based on the State Sequence Network and non-uniform discretization of the time horizon of interest model developed by Majozi and Zhu [Majozi, T., Zhu, X. (2001). A novel continuous-time MILP formulation for multipurpos...

2016
Detlef Hühnlein Tilman Frosch Jörg Schwenk Carl-Markus Piswanger Marc Sel Tina Hühnlein Tobias Wich Daniel Nemmert René Lottes Juraj Somorovsky Vladislav Mladenov Cristina Condovici Herbert Leitold Sophie Stalla-Bourdillon Niko Tsakalakis Jan Eichholz Frank-Michael Kamm Andreas Kühne Damian Wabisch Roger Dean Jon Shamah Mikheil Kapanadze Nuno Ponte Jose Martins Renato Portela Cagatay Karabat Snezana Stojicic Slobodan Nedeljkovic Vincent Bouckaert Alexandre Defays Bruce Anderson Michael Jonas Christina Hermanns Thomas Schubert Dirk Wegener Alexander Sazonov

Against the background of the regulation 2014/910/EU [EU1] on electronic identification (eID) and trusted services for electronic transactions in the internal market (eIDAS), the FutureTrust project, which is funded within the EU Framework Programme for Research and Innovation (Horizon 2020) under Grant Agreement No. 700542, aims at supporting the practical implementation of the regulation in E...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده علوم انسانی 1391

the rise and stublishment of safavid dynasty was depend on triangle of tasavof, tashayo and royalty, kings legitimized their power upon these. therefore for the understanding the functions of that period we must explore the role of this elements. although application and emphsise upon dignities such as; complete mentor (morshede kamel), deputy of absent imam (nayebe imame ghayeb), and god’s sha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید