نتایج جستجو برای: compromising international security
تعداد نتایج: 487404 فیلتر نتایج به سال:
Secure software systems ultimately rely on the assumption that microprocessors are trustworthy. By modifying lines of Verilog code, a malicious designer could inject a hardware backdoor, subverting all security software and compromising confidentiality, integrity, or availability of a system. In security and safety critical systems, such as military and airline systems, this is an unacceptable ...
Web based scientific applications have provided a means to share scientific data across diverse groups and disciplines extending beyond the local computing environment. But the organization and sharing of large and heterogeneous data pose challenges due to their sensitive nature. In this paper we analyze the security requirements of scientific applications and present an authorization model tha...
This paper presents a system architecture and the appropriate algorithms for confidential searching of multimedia digital libraries. The proposed scheme uses Middleware service layer that allows pre-processing of raw content with technology owned by the Search Engine, without compromising the security of the original architecture in any way. The specific search algorithms described are a hierar...
The study of conoict and cooperation has been an enduring task of scholars, with the most recent arguments being between realists and neoliberal institutionalists.1 Most students of the subject believe that realists argue that international politics is characterized by great conoict and that institutions play only a small role. They also believe that neoliberals claim that cooperation is more e...
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect the mobile users, the radio access network, the fixed part of the network, and the related data of GPRS are presented and analyzed in details. This analysis reveals the security weaknesses of the applied measures that ma...
Today, military and commercial Spread Spectrum and CDMA transmission systems argue with security on the physical layer based on the secrecy of the seed values of static secure (and insecure) pseudorandom noise generators (PRNG). This should prevent eavesdropping and jamming [1, 2]. Confidentiality, data integrity and authenticity are usually realized in higher protocol layers [3]. Nevertheless,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید