A Security Analysis on OpenSIPS
نویسندگان
چکیده
منابع مشابه
a critical discourse analysis on gender representation in the iranian english books 2, 3 and top notch 2a, 2b a critical discourse analysis perspective
هدف از انجام تحقیق حاضر، مطالعه و بررسی نقش زنان و مردان در دو مجموعه از کتابهای درسی انگلیسی در قالب تحلیل گفتمان انتقادی و همچنین، بررسی و آشکار ساختن اصول ایدوئولوژیکی مربوط به نقش زنان و مردان در این کتابها است. این دو مجموعه کتاب عبارتنداز: کتابهای انگلیسی سال دوم و سوم دبیرستانی ایران و کتابهای تاپ ناچ 2آ و 2ب. برای انجام این منظور، مدل تحلیل گفتمان انتقادی فرکلاف مورد استفاده قرار گرفته ...
15 صفحه اولturkish-israeli relations and their implication on iranian national security
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
15 صفحه اولa legal analysis on security for costs in probate matters
after considering the security for costs as a rarely considered establishment and analyzing legal points and problems concerning that security which is located among the articles on provisional remedy, and after having a look at the security for costs against foreign claimants, present research analysis brings the security for costs in probate matters as its main subject into focus to the exten...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJAIT (International Journal of Applied Information Technology)
سال: 2020
ISSN: 2581-1223
DOI: 10.25124/ijait.v3i02.2503