Authenticating the learning environment

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticating Devices in Ubiquitous Computing Environment

The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such environment are said to be exposed to attacks such as identity impostor, man-in-the-middle attacks and also unauthorized attacks. Thus, this has created skeptical among the users and has resulted them of k...

متن کامل

Empowering Nurses: Explaining the Role of Organizational Learning and the Dynamics of the Learning Environment

Introduction: Researchers acknowledge that different educational and contextual factors can influence human resource development. Because of stress in hospital wards environment and lack of personnel’s support for student, personnel’s aggressive tempers, the supporting of nursing students is an important factor. Therefore, The present study aims to investigate the role of educational environmen...

متن کامل

Authenticating Network-Attached Storage

0272-1732/00/$10.00  2000 IEEE The need to access anything from anywhere has increased the role of distributed file servers in computing. Distributed file systems provide local file system semantics for access to remote storage. This allows network clients to incorporate the remote storage into their local file system. File semantics are well understood by users and applications, making distri...

متن کامل

Medical students’ academic emotions: the role of perceived learning environment

Introduction: Research shows that there is a relationship betweenstudents’ perceptions of classroom and learning environment andtheir cognitive, affective, emotional and behavioral outcomes, so,in this study the relationship between medical students’ perceptionof learning environment and academic emotions was examined.Methods: The research method used was descriptive-correlative.The statistical...

متن کامل

Authenticating Location with Femtocells

Providers of location-based services seek new methods to authenticate the location of their clients. We propose a novel, intelligent infrastructure-based solution that provides spontaneous and transaction-oriented, collusion-resistant mobile device location authentication via an integrated 802.11x wireless access point and 3G femtocell access system. By simply making a voice call while remotely...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Teaching in Travel & Tourism

سال: 2016

ISSN: 1531-3220,1531-3239

DOI: 10.1080/15313220.2016.1245121