نتایج جستجو برای: telecommunication security
تعداد نتایج: 187202 فیلتر نتایج به سال:
However, the tool was only accessible through a limited combination of browsers and PC operating systems; and on few mobile devices. The customer therefore tasked Mindtree with validating its flagship application to ensure that accuracy, security and user interface standards were not compromised on any of the desired browser and operating system combination. They wanted an automated solution fo...
— To date, most solutions proposed for secure routing in mobile, ad-hoc networks (MANETs) assume that secure associations between pairs of nodes can be established on-line; e.g., by a trusted third party, by distributed trust establishment. However, establishing such security associations, with or without trusted third parties, requires reliance on routing layer security. In this paper, we elim...
the aim of this research is to prioritize the key factors for implementation of idea virtual bank (ivb) in telecommunication industry. the current applied and descriptive research was conducted based on a survey. the population of this research consisted of all users of ivb and idea submitters to suggestion system of telecommunication industry in province of razavi-khorasan that 70 of them were...
The HKM / HFX cryptosystem is proposed for standardization at the ITU Telecommunication Standardization Sector Study Group 8. It is designed to provide authenticity and colffidentiality of FAX messages at a commercial level of security. In addition, the HKM / HFX cryptosystem is designed for unrestricted export. This paper contains the results of an analysis of the HKM/HFX cryptosystem. Eleven ...
In this paper we are focusing on secure logging for public network providers. We review existing security threat models against system logging and we extend these to a new threat model especially suited in the environment of telecommunication network providers. We also propose a framework for secure logging in public communication networks as well as realistic implementations designs, which are...
A digital signature is a term used to describe a data string which associates a digital message with an assigned person only. Therefore, the main goal (or contribution) of this work is to study a simple method for generating digital signatures and cryptography communication using biometrics. The digital signature should be generated in the way that it can be verified by the existing cryptograph...
The early struggles with the internet was finding a way to safely buy and sell goods or transfer funds using computer and telecommunication networks. The goal was to enable e-commerce by providing a safe, convenient and immediate payment system on the internet. But internet is notorious for giving its users a feeling of anonymity. The inadequate security results in major damage. Now a days a nu...
The ARMOR (Assistant for Randomized Monitoring Over Routes) project has been developing methods for creating randomized plans and processes, so that even if an attacker observes the plans over time, he/she cannot predict its progression or how it will unfold in the future, thus providing risk reduction while guaranteeing a certain level of protection quality. Our key research accomplishments ha...
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security service that generates, distributes, validates, and maintains the evidence of an electronic transaction. Quite of number of non-repudiation protocols have been proposed in distributed systems and evaluated based on som...
Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from Denial of Service attacks, especially HTTP or XML-Based Denial of Service attacks. These types of attacks are simple and easy to implement by the att...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید