نتایج جستجو برای: keywords notional security
تعداد نتایج: 2121554 فیلتر نتایج به سال:
We propose a fast algorithm for computing the expected tranche loss in the Gaussian factor model. We test it on a 125 name portfolio with a single factor Gaussian model and show that the algorithm gives accurate results. We choose a 125 name portfolio for our tests because this is the size of the standard DJCDX.NA.HY portfolio. The algorithm proposed here is intended as an alternative to the mu...
Depiction Verbs and the Definiteness E ff ect Introduction This paper is part of a longer project on the semantics of depiction verbs and their associated relational nouns. Depiction verbs include verbs for physical acts, such as ' draw' (with relational noun ' drawing'), 'sketch', 'caricature', 'sculpt', 'write (about)', and verbs for mental ones, such as 'visualize', 'imagine', and 'fantasi...
Internet of Things (IoT) is a network of physical objects connected to internet. Physical objects embedded with RFID, sensor and so on which allows object to communicate with each other. The physical objects are provided with unique identifier. Since the IoT is highly heterogeneous, security is a big challenge in IoT. In this paper we analyzed the various security requirements and challenges in...
In order to study security systems, we have developed a methodology for application of formal analysis techniques commonly used in communication protocols to the analysis of cryptographic protocols. In particular, we have extended the design and analysis phases of protocol design with security properties. Our proposal uses a specification notation based on HMSC/MSC, which can be automatically t...
String matching also known as pattern matching is one of primary concept for network security. In this area the effectiveness and efficiency of string matching algorithms is important for applications in network security such as network intrusion detection, virus detection, signature matching and web content filtering system. This paper presents brief review on some of string matching technique...
Today the demand for secure transfers of digital images , cryptanalysis and network security is a growing field. In this paper the security of RCES is analyzed and observed that it is insecure against the known/chosen-plaintext attacks .Here two seeds are generated chaotically and XOR’ed with plain image to get cipher image . The security of RCES against the bruteforce attack was overestimated....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید