نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Journal: :Digital Evidence and Electronic Signature Law Review 2014

2003
Simon Byers Lorrie Faith Cranor Dave Korman Patrick McDaniel

Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some case...

2016
Konstantinos Koutentakis María Elena Rosales-Statkus Juan Hoyos Sonia Fernández-Balbuena Mónica Ruiz Cristina Agustí Luis de la Fuente María José Belza

BACKGROUND Shortly after the approval of an over-the-counter HIV self-test in the US, we conducted a study to estimate the proportion of men who have sex with men (MSM) in Spain who knew that unauthorized HIV self-tests could be purchased online, and the proportion that had already used these tests, as well as their socio-demographic and behavioural correlates. METHODS Between September 2012 ...

2018
Yongjian Liao Yichuan He Fagen Li Shaoquan Jiang Shijie Zhou

Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts c...

Journal: :Int. J. Digital Earth 2011
Mazlan Hashim Norzailawati Mohd. Noor Maged Marghany

The paper explores a framework combining remote sensing and GIS-cellular automata (CA) concepts aimed at improving the modeling of unauthorized land use sprawl. Remote sensing data have been used in urban modeling and analysis, the use of high-resolution remote sensing data in assessing unauthorized development is quite unexplored. This work has demonstrated systematic combination utilization o...

2011
Stephen Lee

More than two-thirds of the unauthorized immigrant population—roughly 8 million out of 11.2 million—is in our nation’s workforce, and growing evidence suggests that unauthorized workers are more likely than their authorized counterparts to experience workplace-related violations. Although scholars have begun shifting their focus to the agencies empowered to regulate immigrants in the workplace,...

2006
Parag Agarwal B. Prabhakaran Bhavani Thuraisingham

Distributed web services are under constant threat of being attacked from nodes, internal or external to the system. Internal attacks may result from hijacking of trusted web servers, resulting in loss/corruption of information, and Denial of Service (DoS) to clients. External attacks can occur from hijacking of trusted clients or malicious nodes leading to DoS to clients. The paper focuses on ...

Journal: :Security and Communication Networks 2014
Di Ma Nitesh Saxena

RFID systems are becoming increasingly ubiquitous in both public and private domains. However, due to the inherent weaknesses of underlying wireless radio communications, RFID systems are plagued with a wide variety of security and privacy threats. A large number of these threats arise due to the tag’s promiscuous response to any reader requests. This renders sensitive tag information easily su...

Journal: :International Journal of Sustainable Built Environment 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید