نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...
Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most of them are not resilient to nodes c...
Introduction: The high prevalence of emotional eating in obese women indicates the importance of the role of emotional eating in their weight gain. The aim of the present study is to explain the role of emotional eating in the lived experiences of young obese Iranian women. Methods: This study was performed by qualitative method with hermeneutic phenomenological approach. Participants in this ...
the criminal justice and observance of human rights principles have important roles in efficiency of bodies involved in combating against terrorism. as some states like u.k. have violated several international provisions such as international civil and political covenant and the european convention of human rights, this article tries to verify anti-terrorism crime and security act (atcsa) and i...
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only capable of compromising tags, but also of compromising readers. This more properly models large scale deployment of RFID technology such as in public transport ticketing systems and supply-chain management systems. In...
To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that al...
Data aggregation scheme is a technique which reduces the large amount of transmission in wireless sensor networks. In the existing system, homomorphic encryptions are used to conceal communication during aggregation. The enciphered data can be aggregated algebraically without decryption, hence compromising the security issues and adversaries are able to collect valuable data. Hence these scheme...
Environmental security has become one of the main pillars international security, and environment climate issues have at forefront that are addressed focused on in various discussions, due to importance these their vitality for man. During past three decades, environmental problems defining many global trends In light exacerbated as a result self-interests states desire expand economy well cont...
Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید