نتایج جستجو برای: security model
تعداد نتایج: 2246841 فیلتر نتایج به سال:
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
Location and types of sensors may be integrated for simultaneous achievement of water security goals and other water utility objectives, such as regulatory monitoring requirements. Complying with the recent recommendations on dual benefits of sensors, this study addresses the optimal location of these types of sensors in a multipurpose approach. The study presents two mathematical models for ...
Background: Villagization scheme was chosen as a policy option and implemented to ensure sustainable food security in Assosa zone, Benishangul-Gumuz region, Ethiopia, although it is blamed for intensifying food insecurity instead. Therefore, the present study aimed to examine the food security status of households gathered in planned villages in the framework of villagization. Methods: This cro...
Background & Objectives : It is not possible to live without using fire. However, fire could destruct human properties in a short time. One of the most important types of fire is intentional fire. This type of fire has become a great problem for insurance companies, fire departments, industries, government and business in the recent years. This study aimed to provide a framework for risk assess...
Increasing urbanization today and the lack of integrated urban management have led to inadequate planning in cities. In this regard, the local councils, as the most prominent local institutions and the most important decentralization manifestations, symbolize the serious presence of the people to determine their own fate, if they are institutionalized in the governance structure as coordinators...
electronic payment system in one of the e-banking services and must be reliable and free of security deficiencies in order to overcome traditional system. improving customer’s perceptions of security and trust in the course of electronic payment transactions is vital in order to attract, retain and retrieve users of such a system. this study aimed to investigate the effects of customers’ percep...
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید