نتایج جستجو برای: compromising international security

تعداد نتایج: 487404  

The foreign policy of states determines the way they behave in the international arena. Accurate analysis of official foreign policy documents of a country is helpful in that it shows what the international priorities of a country are at specific periods. This article reviews the U.S. National Security Strategy documents published in 2002, 2006, 2010 and 2015 from the perspective of the percept...

2007
Chakib Bekara Maryline Laurent-Maknavicius

Wireless Sensor Networks (WSN) security is an important issue which has been investigated by researchers for few years. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most of them are not resilient to nodes c...

Introduction: The high prevalence of emotional eating in obese women indicates the importance of the role of emotional eating in their weight gain. The aim of the present study is to explain the role of emotional eating in the lived experiences of young obese Iranian women. Methods: This study was performed by qualitative method with hermeneutic phenomenological approach. Participants in this ...

Journal: :مجله حقوقی بین المللی 0
مهدی حاتمی دانشجوی دکتری حقوق بین الملل دانشگاه تهران محمود حاجی زاده دانشجوی کارشناسی ارشد حقوق بشر دانشگاه تهران

the criminal justice and observance of human rights principles have important roles in efficiency of bodies involved in combating against terrorism. as some states like u.k. have violated several international provisions such as international civil and political covenant and the european convention of human rights, this article tries to verify anti-terrorism crime and security act (atcsa) and i...

Journal: :Journal of Economic Theory 2009

2010
Flavio D. Garcia Peter van Rossum

This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only capable of compromising tags, but also of compromising readers. This more properly models large scale deployment of RFID technology such as in public transport ticketing systems and supply-chain management systems. In...

2007
Chakib Bekara Maryline Laurent-Maknavicius Kheira Dari Bekara

To increase the lifespan of wireless sensor networks (WSN) and preserve the energy of sensors, data aggregation techniques are usually used. Aggregation can be seen as the process by which data sent from sensors to the BS are little-by-little processed by some nodes called aggregator nodes. Aggregators collect data from surrounding nodes and produce a small sized output, thus preventing that al...

2015
R. Raguraman S. Priya

Data aggregation scheme is a technique which reduces the large amount of transmission in wireless sensor networks. In the existing system, homomorphic encryptions are used to conceal communication during aggregation. The enciphered data can be aggregated algebraically without decryption, hence compromising the security issues and adversaries are able to collect valuable data. Hence these scheme...

Journal: : 2023

Environmental security has become one of the main pillars international security, and environment climate issues have at forefront that are addressed focused on in various discussions, due to importance these their vitality for man. During past three decades, environmental problems defining many global trends In light exacerbated as a result self-interests states desire expand economy well cont...

2013
Liu Jinming Mao Jian Zhang Jiemin Li Yongmei

Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید