نتایج جستجو برای: secured

تعداد نتایج: 6557  

Journal: :International Journal of Computer Applications 2013

Journal: :International Journal of Engineering & Technology 2018

2016
Jack C. Buckley Adam P. Brown John S. Shin Kirsten M. Rogers Nir N. Hoftman

BACKGROUND Endotracheal tube security is a critical safety issue. We compared the mobility of an in situ endotracheal tube secured with adhesive tape to the one secured with a new commercially available purpose-designed endotracheal tube-holder device (Haider Tube-Guard). We also observed for the incidence of oropharyngeal or facial trauma associated with the 2 tube fixation methods. METHODS ...

2014
M SANKAR

Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software development approaches. With Aspect-Oriented Programming (AOP), separating concerns when designing an application fosters reuse, parameterization and maintenance. I...

Journal: :Information Systems Security 1998
Steven F. Blanding

INTRODUCTION A private network that carries sensitive data between local computers requires proper security measures to protect the privacy and integrity of the traffic. When such a network is connected to other networks, or when telephone access is allowed into that network, the remote terminals, phone lines, and other connections become extensions to that private network and must be secured a...

Journal: :Journal of wound, ostomy, and continence nursing : official publication of The Wound, Ostomy and Continence Nurses Society 2016
Yvonne Appah Kathleen F Hunter Katherine N Moore

PURPOSE The aims of this study were 4-fold: (1) to examine the proportion of indwelling urinary catheters that were secured in an acute care setting; (2) to determine the proportion of secured catheters that were secured correctly; (3) to examine the association of catheter securement with type of unit, age, sex, and location of insertion; and (4) to determine the proportion of units with cathe...

2011

The techniques such as secured socket layer (SSL) with clientside certificates are well known in the security research community, most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user‟s plaintext password to a remote web server, often using SSL. Even when used over an encrypted connection, this form of password authentication is vul...

2011
Santhosh Baboo

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically shaping a provisional network devoid of the use of any existing network infrastructure or centralized management. In MANETs, security is the major challenge due to the dynamic topology which is because of the mobility of the nodes. In this paper, we propose to design and develop a secure methodology incorporate...

2010
A. Krishnan

The techniques such as secured socket layer (SSL) with client-side certificates are well known in the security research community, most commercial web sites rely on a relatively weak form of password authentication, the browser simply sends a user’s plaintext password to a remote web server, often using SSL. Even when used over an encrypted connection, this form of password authentication is vu...

2014
Kulkarni Laxmi

In order to improve the security of the Military kinds of network this work is proposed. Here the position of missile navigates as per the user’s requirement. The user sends the co-ordinates through pc based server on the base station. For security purpose encryption is done with RC4algorithm implementation. The system that uses Human Computer Interaction and Visualization technology provides s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید