نتایج جستجو برای: secure
تعداد نتایج: 56843 فیلتر نتایج به سال:
همراه با رشد روز افزون استفاده از کارت های اعتباری در تراکنش های اینترنتی و در حالت کلی تر تجارت الکترونیکی، نیاز به معماری های امنیتی دقیق تر و سیستم های پرداخت امن تر بیشتر احساس می شود. راه حل های بسیاری برای مقابله با دو مشکل عمده تراکنش های اینترنتی، phishing و حملات مرتبط با اطلاعات محرمانه ذخیره شده کارت های اعتباری، ارائه شده اند. استاندارد امنیت اطلاعات در صنعت کارت های پرداخت راه کاره...
the purpose of present research was comparing tendency to risky behaviours in secure/insecure attachment in parents (mother/father). the results showed that those showing insecure attachment patterns towards the mother were significantly higher at risk to become cigarette smokers, drug persuasion, and alcohol drinkers compared to those with secure attachment patterns. those showing insecure att...
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
Let be a simple graph with vertex set and edges set . A set is a dominating set if every vertex in is adjacent to at least one vertex in . An eternal 1-secure set of a graph G is defined as a dominating set such that for any positive integer k and any sequence of vertices, there exists a sequence of guards with and either or and is a dominating set. If we take a guard on every ver...
Purpose: This study was done to predict sexual communication based on attachment style and differentiation of self in married female students of Universities in city of Ahvaz. The 220 participants were selected through accessible sampling. Methods: The participants completed Wheeless & Baus Sexual Communication Scale (1984), Simpson Adult Attachment Scale Questionnaire (2003), and Differentiati...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید