نتایج جستجو برای: security order

تعداد نتایج: 1066303  

, ,

Background: The basics of preventing fraud in business are the commonalities of the two systems of ethics and law. The basics of this rule indicate the non-prescription and prevention of fraud. The principles at stake are for the protection of individuals' interests and property security, and even for the maintenance of order in society, and those who seek to exploit fraud for the greater benef...

Journal: :IACR Cryptology ePrint Archive 2013
Emmanuel Prouff Matthieu Rivain Thomas Roche

At TCC 2012, Dziembowski and Faust show how to construct leakage resilient circuits using secret sharing based on the inner product [2]. At Asiacrypt 2012, Ballash et al. turned the latter construction into an efficient masking scheme and they apply it to protect an implementation of AES against side-channel attacks [1]. The so-called Inner-Product masking (IP masking for short) was claimed to ...

Journal: :نظریه های اجتماعی متفکران مسلمان 0
فریبا شایگان دانشیار دانشگاه علوم انتظامی امین

there are a variety of definitions about social security and threats indicating a lack of consensus on this issue, and not considering the impact of social conditions of different countries. thus, although in a scientific study considering other viewpoints can be useful, in order to be practical, we should indigenously note indigenous conditions and domestic scholar’s comments. based on this id...

Present paper, using a descriptive-analytical approach, is aimed to analysis the transformations in Bahrain and challenges and opportunities facing the national security of Iran. In order to achieve research objectives, present study employed Martin’s integrated approach in studying Middle East’s national security as theoretical framework and considering five independent variables (combination ...

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

2011
M. Thirumaran P. Dhavachelvan S. Abarna

Nowadays, the services offered by the Service Providers are subjected to many risks in terms of privacy agreements and hence they are treated as untrustworthy. Security risk analysis is fundamental to the security of any business and it is considered to be very essential in ensuring that controls and expenditure are fully commensurate with the risks to which the business is exposed. Hence, the ...

2006
Spyros T. Halkidis Alexander Chatzigeorgiou George Stephanides

The importance of Software Security has been evident, since it has been shown that most attacks to software systems are based on vulnerabilities caused by software poorly designed and developed. Furthermore, it has been discovered that it is desirable to embed security already at design phase. Therefore, patterns aiming at enhancing the security of a software system, called security patterns, h...

2012
Lars Persson

The project had two intended goals. One was to create a prototype for the proxy component of the Secure Webservice Platform system that can function on the GNU/Linux operating system. The other goal was to evaluate a number of different SOAP security methods in order to determine if any could function as a alternative to the Specifikation för Säker Elektronisk Kommunikation (SSEK) standard. In ...

ژورنال: یافته 2017
شکری جوکاری, سمیرا, فلاحی, ابراهیم, قاضی, شیرین,

Background: This paper aims to examine the association between food security and passive defense and the position of food security in this context. Given the role of healthy manpower in the development of a country and the importance of healthy food and nutrition in human health as the core center of development and the main confronting factor with foreign threats, in this paper, we first discu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید