نتایج جستجو برای: unsecured existence
تعداد نتایج: 179118 فیلتر نتایج به سال:
Autonomic characteristics can dramatically improve the efficiency of opportunistic communications. The main contribution of autonomic communications to opportunistic architectures is to simplify, automate, protect and enhance the knowledge. This allows empowering and making more effective the information handling and exchanges in the face of a complex, dynamic, uncertain, and unsecured environm...
This paper will cover the addition of security to several Solaris servers through the use of host-based firewall software. The servers reside on an unsecured university network. I will attempt to detail the choices that were made in the selection of the firewall software as well as its installation and configuration. I will conclude with a comparison of the vulnerability assessments from before...
Enterprise Wireless Fidelity implementations have complicated requirements for Authentication, Authorization, Accounting (AAA) and detection of unauthorized access. Recent incidents show that unsecured implementations invite severe risk to enterprise network and data (especially for financial and critical sectors). In this paper a secure implementation is proposed which addresses most of the po...
We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also known as information reconciliation and privacy amplification over unsecured channels, was shown to be theoretically feasible by Renner and Wolf (Eurocrypt 2004), although no protocol that runs in polynomial time was d...
Loss Given Default (LGD) is the loss borne by the bank when a customer defaults on a loan. LGD for unsecured retail loans is often found difficult to model. In the frequentist (nonBayesian) two-step approach, two separate regression models are estimated independently, which can be considered potentially problematic when trying to combine them to make predictions about LGD. The result is a point...
We propose a theory of unsecured consumer credit where: (i) borrowers have the legal option to default; (ii) defaulters are not exogenously excluded from future borrowing; (iii) there is free entry of lenders; and (iv) lenders cannot collude to punish defaulters. In our framework, limited credit or credit at higher interest rates following default arises from the lender’s optimal response to li...
It was known to us from decades it is been a factual challenge for us to transfer the privileged data specially images to transfer over a unsecured channel. In this paper we propose a novel image encryption technique using DNA interwearing based Hybridization along with chaotic maps to transfer image data over a unsecured channel. In the early stages we apply Duffing map(chaotic map) on the ori...
Internet has revolutionized the data communication systems. It provides platform to get the information exchanged quickly amongst the communicating parties at the same time it also provides opportunity to adversary to attack on unsecured information. In order to provide confidentiality, integrity and authentication services to unsecured information while transit or static, cryptographic techniq...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید