نتایج جستجو برای: unsecured existence

تعداد نتایج: 179118  

1999
R. Khare

This memo applies the Upgrade mechanism in HTTP/1.1 to employ Transport Layer Security (TLS) over an existing TCP connection. This allows unsecured and secured traffic to share the same well known port (in this case, http: at 80 rather than https: at 443). This also enables "virtual hosting," by allowing a single HTTP + TLS server to disambiguate traffic intended for several hostnames at a sing...

Journal: :Sultan Agung Notary Law Review 2022

Micro Business Credit is financing for Micro, Small, Medium Enterprises (MSMEs) in the form of providing working capital supported by guarantee facilities productive businesses. Bank BKC Susukan Branch Cirebon Regency a Regional Rural addition to conventional commercial banks such as BNI, BTN, Mandiri, Bukopin, Mandiri Syariah which trusted government distribute business loans. The phenomenon t...

2006
Satyajit Chatterjee Dean Corbae Neil Wallace

We present a theory of unsecured consumer debt that recognizes a debtor’s legal right to default. Our theory does not rely on psychological costs of default (or stigma) nor does it rely on enforcement mechanisms that arise in repeated-game settings. Our theory is based on private information about a person’s type and on a person’s incentive to signal his type by avoiding default in the credit m...

Journal: :Syntax literate : jurnal ilmiah Indonesia 2023


 Unsecured Credit (KTA), is one of the products financing institutions such as banks. KTA a product that quite widely carried out in addition to people's business loans and leasing. This considered commonly given by banks their debtor customers, analyzing track record making agreement transactions according opportunity. So KITA has until now become fairly legal even shaded BI OJK. However...

Journal: :International Journal of Power Electronics and Drive Systems 2021

The wireless sensor network is becoming the most popular in last recent years as it can measure environmental conditions and send them to process purposes. Many vital challenges face deployment of WSNs such energy consumption security issues. Various attacks could be subjects against cause damage either stability communication or destruction sensitive data. Thus, demands intrusion detection-bas...

Journal: :Journal of King Saud University - Computer and Information Sciences 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید