نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
Several papers have published very specific threats to wireless networks—specifically in the area of attacks against the IEEE 802.11 Wired Equivalency Protocol (WEP). Other papers have addressed wireless attacks based on the attack models used in wired networks. However, the different characteristics of wireless networks require looking at the threat differently. We present a Wireless Threat Ta...
The cloud Computing provides an undemanding and Non ineffectual Solution for Daily Computing. The prevalent Problem Associated with Cloud Computing is the Cloud security and the appropriate Implementation of Cloud over the Network. Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. P...
AVRDC – The World Vegetable Center is an international not-for-profit organization committed to ensuring the world's food security through research, development, and training. This informal series includes papers prepared for major symposia (proceedings of which may not appear for 1 or 2 years), important statements of speeches, selected seminar papers, or preliminary papers that require rapid ...
Conferences 2011 IEEE Intelligent Vehicles Symposium (IVS11) Report ....................... 5 2011 IEEE International Conference on Vehicular Electronics and Safety (ICVES 2011) Report ............................................................... 8 2011 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI 2011) Report ................................ 11 201...
We present a structured literature survey of User Experience (UX) dimensions and influencing factors in authentication research. The survey is based on authentication papers presented between 2010 and 2015 on the major human-computer interaction (HCI) and usable privacy and security (UPS) venues. 19% of the found papers include UX topics. Those papers show that there is a variety of ways how au...
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
This paper chronicles the development of economics of information security as an academic area of research. It also describes the contributions of the papers in the special section of this issue devoted to the topic.
There are a number of similarities between our work at the Software Assurance Forum for Excellence in Code (SAFECode) and the BSIMM effort. Both SAFECode and the BSIMM are focused on improving software security. Both have published documents1 about software security practices that offer approaches to advancing secure software development. And both the SAFECode and BSIMM papers can be used as pa...
This paper presents the study of network protocol in respect of security . . In this paper a study of various papers and articles is done, and in this paper we explain two central problems associated with the design and security analysis of network protocols that use cryptographic primitives. The main goal is to develop methods for proving properties of complex protocols by combining independen...
AUTHOR Kondo-Ikemura, Kiyomi; Matsuoka, Yoko TITLE The Characteristics of Attachment Styles in Japanese Students. PUB DATE 1999-04-16 NOTE 11p.; Paper presented at the Biennial Meeting of the Society for Research in Child Development (Albuquerque, NM, April 15-18, 1999). PUB TYPE Reports Research (143) Speeches/Meeting Papers (150) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS *Attachment Beha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید