نتایج جستجو برای: secure
تعداد نتایج: 56843 فیلتر نتایج به سال:
Building digital rights management (DRM) systems for electronic commerce is still a complex task because such systems are usually required to manage a large set of different media contents, rights information, and enabling technologies. The Secure Digital Music Initiative (SDMI) was proposed to provide a secure environment in which rights management is performed for music distribution through t...
abstract background: attachment relationship provides a secure base for the infants from which to explore the environment and a safe haven to return to in times of danger. attachment style shapes the behavior of individuals in adulthood. there are many different measures of attachment and a lot of controversy about what they measure and how they relate to each other. hence, we tried to evaluate...
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
In the age of cloud computing, users with limited storage can outsource their data to remote servers. These servers, in lieu monetary benefits, offer retrievability clients' at any point time. Secure protocols enable a client check integrity outsourced data. this work, we explore possibility constructing secure for dynamic by leveraging algorithms involved network coding. We show that some codi...
Colombia government wants to implement electronic voting. However, the existing voting protocols only include some of required security features and needs a protocol with all these ensure fraud-free elections. In this paper, we present design SIVP (Secure Internet Voting Protocol), new for electoral processes, based on blind signatures public key cryptography. This has six phases provides: elig...
abstract the purpose of this research was to examine the relationship between secure-insecure attachment styles and cognitive distortions . to this end, 403 students from ferdowsi university of mashhad were selected using a random clustering procedure, and completed the collins and read (1990) attachment styles questionnaire and becham, leber, watkins, boyer, and cook’d (1986) cognitive triad i...
aim and background: insecure attachment style is one of the important effective factors in many mental disorders. the aim of this study was to compare the positive, negative and disorganized schizotypal characteristics in secure, avoidance and anxiety attachment patterns among students of tabriz university, iran. methods and materials: in this cross-sectional descriptive study 300 students (150...
feeling secure is a prerequisite of any social, economic, cultural and political development and it is directly related to the level of development of the society. being aware of the situation of security feelings of society members plays a key role in recognizing the challenges and development strategies of society and can strengthen the infrastructures of the society. the present study aims t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید