نتایج جستجو برای: private extension
تعداد نتایج: 247767 فیلتر نتایج به سال:
Little is known regarding the keeping of animals in the Moretele 1 area of North-West Province, South Africa. Therefore, the status and dynamics of animal husbandry, as well as a general assessment of the needs of animal owners in this area were researched. Results of the investigation will be used to make recommendations for improved veterinary extension servicing in the area. Semi-structured ...
IPSec, proposed by IETF, is a popular tunneling technology adopted for the Virtual Private Network. It provides the network layer additional security functionality to transform multiple segments of a private network into one. This paper exploits the extension of IPSec to have secured tunnels for users who might move around dynamically without carrying the same machine. We not only explore imple...
We describe an object calculus that allows both extension of objects and full width subtyping (hiding arbitrary components). In contrast to other proposals, the types of our calculus do not mention “missing” methods. To avoid type unsoundness, the calculus mediates all interaction with objects via “dictionaries” that resemble the method dispatch tables in conventional implementations. Private f...
The IPv4+4 architecture presented in this paper provides an evolutionary approach to the extension of IPv4 address space. It builds on the existence of Network Address Translators (NATs) and private address realms. During and after the transition from IPv4 to IPv4+4 there is no need to change routers, only NATs and end-hosts. End-to-end address transparency is regained incrementally as deployme...
irtual Private Network (VPN) is one of the major trends in the integrated broadband communications environment. There is a myriad of definitions of a VPN used in the networking community to describe a broad set of problems and solutions. In [1], Ferguson et al. define a VPN as a communications environment in which access is controlled to permit peer connections only within a defined community o...
An increase in cloud-based computing leads to an increased worry in the security of user data. Typically, data is sent to a third-party server which performs analytics or machine learning on the data. However, in most of these scenarios, the data involved is sensitive and should remain private. Homomorphic encryption, a form of encryption that allows functions to be performed on encrypted ciphe...
The IPv4+4 architecture presented in this paper provides an evolutionary approach to the extension of IPv4 address space. It builds on the existence of Network Address Translators (NATs) and private address realms. During and after the transition from IPv4 to IPv4+4 there is no need to change routers, only NATs and end-hosts. End-to-end address transparency is regained incrementally as deployme...
Since most of private communication schemes based on chaotic synchronization are not robust again plain-texts attacks, the introduction of delays in the schemes can be regarded as an efficient method to improve the security degree with respect to such attack. As an extension of our recent work, this paper proposes a new analogue private communication scheme based on hybrid chaotic systems with ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید