نتایج جستجو برای: security needs

تعداد نتایج: 415429  

Journal: :SIAM Review 2000
Danny Dolev Cynthia Dwork Moni Naor

The notion of non-malleable cryptography, an extension of semantically secure cryptography , is deened. Informally, the additional requirement is that given the ciphertext it is impossible to generate a diierent ciphertext so that the respective plaintexts are related. The same concept makes sense in the contexts of string commitment and zero-knowledge proofs of possession of knowledge. Non-mal...

2010
Alok Tripathi Abhinav Mishra G. V. Raghunathan

New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationlization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves...

2015
Pierpaolo Basile Annalina Caputo Marco Degemmis Pasquale Lops Giovanni Semeraro

Recommender Systems suggest items that are likely to be the most interesting for users, based on the feedback, i.e. ratings, they provided on items already experienced in the past. Time-aware Recommender Systems (TARS) focus on temporal context of ratings in order to track the evolution of user preferences and to adapt suggestions accordingly. In fact, some people’s interests tend to persist fo...

2001
Gerhard Schiefer Anne Catharina Kreuder

Information portals are means for the delivery of information services to interested groups. The complexity of the agrifood sectors requires a differentiated infrastructure of information portals which serves different categories of information interests. Enterprises information needs build on enterprise-specific information and on information with interest for groups of enterprises which are o...

2014
Vikram Singh Balwinder Saini

In the web, amount of operational data has been increasing exponentially from past few decades, the expectations of data-user is changing proportionally as well. The data-user expects more deep, exact, and detailed results. Retrieval of relevant results is always affected by the pattern, how they are stored/ indexed. There are various techniques are designed to indexed the documents, which is d...

2008
Jodi Schneider

A Conceptual Model Based on User Needs FRBR, the Functional Requirements for Bibliographic Records, is a conceptual model, establishing the purposes, uses, and requirements for bibliographic records. FRBR sets out “a clearly defined, structured framework for relating the data that are recorded in bibliographic records to the needs of the users of those records.” We need such a framework because...

2016
Sebastian Sonntag

transport is a transport-level solution that makes it possible for end hosts to use multiple access networks simultaneously. This dissertation analyzes the feasibility of using multipath transport in mobile networks. Prior studies suggest that a protocol for multipath transport requires user need, that the protocol is superior to existing solutions, and that the network has capacity. This disse...

2008
Martyn Styles Theodore Tryfonas

It is becoming increasingly important that employees are taken through a more rigorous security-awareness training programme, in order to protect their personal computer and the networks behind it and to ‘protect them from themselves’. Virus and spam writers have begun to try to fool employees with ‘social engineering’ techniques, which prey on an employee’s willingness to believe in an email s...

2008
JORGE A. RUIZ-VANOYE OCOTLAN DÍAZ-PARRA ISMAEL RAFAEL PONCE-MEDELLÍN JUAN CARLOS OLIVARES-ROJAS Jorge A. Ruiz-Vanoye

The necessity of the companies and organizations to adapt the technological changes of the computer science takes to formulated key questions: How to measure the security of my organization?, What type of Computer Science Security needs my company, financial organization, or government? Did my financial organization counts with aspects of computer science security in the correct areas? What new...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید