نتایج جستجو برای: telecommunication security

تعداد نتایج: 187202  

2013

However, the tool was only accessible through a limited combination of browsers and PC operating systems; and on few mobile devices. The customer therefore tasked Mindtree with validating its flagship application to ensure that accuracy, security and user interface standards were not compromised on any of the desired browser and operating system combination. They wanted an automated solution fo...

2003
Rakesh Bobba Laurent Eschenauer Virgil D. Gligor William A. Arbaugh

— To date, most solutions proposed for secure routing in mobile, ad-hoc networks (MANETs) assume that secure associations between pairs of nodes can be established on-line; e.g., by a trusted third party, by distributed trust establishment. However, establishing such security associations, with or without trusted third parties, requires reliance on routing layer security. In this paper, we elim...

Journal: :توسعه کارآفرینی 0
ابوالقاسم عربیون دانشیار، دانشکده کارآفرینی، دانشگاه تهران غلامحسین عبد الله زاده استادیار-دانشگاه علوم کشاورزی و منابع طبیعی گرگان محمد شریف شریف زاده دانشیار-دانشگاه علوم کشاورزی و منابع طبیعی گرگان بهرام رضا امیری دانش آموخته کارشناسی ارشد کارآفرینی-دانشگاه تهران

the aim of this research is to prioritize the key factors for implementation of idea virtual bank (ivb) in telecommunication industry. the current applied and descriptive research was conducted based on a survey. the population of this research consisted of all users of ivb and idea submitters to suggestion system of telecommunication industry in province of razavi-khorasan that 70 of them were...

1996
Xuejia Lai Rainer A. Rueppel

The HKM / HFX cryptosystem is proposed for standardization at the ITU Telecommunication Standardization Sector Study Group 8. It is designed to provide authenticity and colffidentiality of FAX messages at a commercial level of security. In addition, the HKM / HFX cryptosystem is designed for unrestricted export. This paper contains the results of an analysis of the HKM/HFX cryptosystem. Eleven ...

2006
Vassilios Stathopoulos Panayiotis Kotzanikolaou Emmanouil Magkos

In this paper we are focusing on secure logging for public network providers. We review existing security threat models against system logging and we extend these to a new threat model especially suited in the environment of telecommunication network providers. We also propose a framework for secure logging in public communication networks as well as realistic implementations designs, which are...

2007
Je-Gyeong Jo Jong-Won Seo Hyung-Woo Lee

A digital signature is a term used to describe a data string which associates a digital message with an assigned person only. Therefore, the main goal (or contribution) of this work is to study a simple method for generating digital signatures and cryptography communication using biometrics. The digital signature should be generated in the way that it can be verified by the existing cryptograph...

2011
N. LEENA

The early struggles with the internet was finding a way to safely buy and sell goods or transfer funds using computer and telecommunication networks. The goal was to enable e-commerce by providing a safe, convenient and immediate payment system on the internet. But internet is notorious for giving its users a feeling of anonymity. The inadequate security results in major damage. Now a days a nu...

2008
Milind Tambe Fernando Ordonez

The ARMOR (Assistant for Randomized Monitoring Over Routes) project has been developing methods for creating randomized plans and processes, so that even if an attacker observes the plans over time, he/she cannot predict its progression or how it will unfold in the future, thus providing risk reduction while guaranteeing a certain level of protection quality. Our key research accomplishments ha...

2003
Seokwon Yang Stanley Y. W. Su Herman Lam

In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security service that generates, distributes, validates, and maintains the evidence of an electronic transaction. Quite of number of non-repudiation protocols have been proposed in distributed systems and evaluated based on som...

Journal: :JDCTA 2010
Fan Lin Wenhua Zeng Yi Jiang

Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. One of the most serious threats to cloud computing itself comes from Denial of Service attacks, especially HTTP or XML-Based Denial of Service attacks. These types of attacks are simple and easy to implement by the att...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید