نتایج جستجو برای: secure

تعداد نتایج: 56843  

Journal: :Concurrency and Computation: Practice and Experience 2009

Journal: :International Journal of Research in Engineering and Technology 2014

Journal: :International Journal of Information Security 2022

Abstract In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flipping coins is indispensable in this manner, themselves never been spotlight. Therefore, we would like make physical rise level just as a deck playing cards has used perform secure multi-party computation. Such card-based protocol known be helpful both com...

Journal: :International Journal of Communications, Network and System Sciences 2011

Journal: :Journal of Computer Science and Cybernetics 2012

Journal: :مدیریت فناوری اطلاعات 0
محمدرضا تقوا استادیار دانشکده مدیریت و حسابداری، دانشگاه علامه طباطبایی، تهران، ایران ماندانا ایزدی کارشناس ارشد رشته مدیریت فناوری اطلاعات، دانشگاه علامه طباطبایی، تهران، ایران

the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...

Journal: :international journal of agricultural science, research and technology in extension and education systems 2013
muhammad furqan mirza badar naseem siddiqui muhammad hanif almas jabeen ghazala sadaf

about half of the population in pakistan is food insecure. the study focused the food secure population and the strategies for reducing poverty in district rawalpindi. the study was carried out in district rawalpindi in the punjab province of pakistan. simple random sampling technique was used for this research study in district rawalpindi. a sample of 120 respondents was selected. then the dat...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید