نتایج جستجو برای: authentication data structure

تعداد نتایج: 3694940  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

Journal: :International Journal of Security and Networks 2009

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده علوم طبیعی 1391

in recent years many researchers have been focused on interaction of small molecules with dna. dna is generally the primary intracellular of anticancer drugs, so the interaction between small molecules and dna can cause dna damage in cancer cells, blocking the division of cancer cells and resulting in cell death. the flavonoids are a large group of polyphenolic natural products that are widely ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

the present research was conducted to accomplish two purposes. firstly, it aimed to explore and describe schematic structure or what halliday and hassan (1989, p.64) have called “generic structure potential” (gsp) of american english, iranian persian and iranian english newspaper editorials within systemic functional linguistics. secondly, a quantitative cross-comparison was made to investigate...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

2007
Giuseppe Di Battista Bernardo Palazzi

We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an e...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید