A Security Analysis on OpenSIPS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

a critical discourse analysis on gender representation in the iranian english books 2, 3 and top notch 2a, 2b a critical discourse analysis perspective

هدف از انجام تحقیق حاضر، مطالعه و بررسی نقش زنان و مردان در دو مجموعه از کتابهای درسی انگلیسی در قالب تحلیل گفتمان انتقادی و همچنین، بررسی و آشکار ساختن اصول ایدوئولوژیکی مربوط به نقش زنان و مردان در این کتابها است. این دو مجموعه کتاب عبارتنداز: کتابهای انگلیسی سال دوم و سوم دبیرستانی ایران و کتابهای تاپ ناچ 2آ و 2ب. برای انجام این منظور، مدل تحلیل گفتمان انتقادی فرکلاف مورد استفاده قرار گرفته ...

15 صفحه اول

turkish-israeli relations and their implication on iranian national security

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

15 صفحه اول

a legal analysis on security for costs in probate matters

after considering the security for costs as a rarely considered establishment and analyzing legal points and problems concerning that security which is located among the articles on provisional remedy, and after having a look at the security for costs against foreign claimants, present research analysis brings the security for costs in probate matters as its main subject into focus to the exten...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJAIT (International Journal of Applied Information Technology)

سال: 2020

ISSN: 2581-1223

DOI: 10.25124/ijait.v3i02.2503