نتایج جستجو برای: keywords national security

تعداد نتایج: 2442661  

Journal: :فصلنامه مطالعات جهان 0
جواد شعرباف دکترای علوم سیاسی، دانشگاه تهران

national security and the different modalities used by states to guarantee and promote it may be considered as a most complex responsibility of governments. although there are different environmental conditions attributed to this notion and there exist a variety of definitions for it, us policy-makers have expanded the transnational application(s) of this concept on a daily basis. the following...

2012
H. Soussi M. Hussain H. Afifi D. Seret

Key management is a vital component in any modern security protocol. Due to scalability and practical implementation considerations automatic key management seems a natural choice in significantly large virtual private networks (VPNs). In this context IETF Internet Key Exchange (IKE) is the most promising protocol under permanent review. We have made a humble effort to pinpoint IKEv2 net gain o...

Journal: :nutrition and food sciences research 0
majid hasan-ghomi department of clinical nutrition and dietetics, faculty of nutrition sciences and food technology, national nutrition and food technology research institute, shahid beheshti university of medical sciences, tehran, iran parvin mirmiran health technology assessment, standardization and tariff management, deputy of curative affairs ministry of health and medical education, tehran, iran golaleh asghari nutrition and endocrine research center, obesity research center, research institute for endocrine sciences, shahid beheshti university of medical sciences, tehran, iran zohreh amiri department of basic sciences, faculty of nutrition sciences and food technology, national nutrition and food technology research institute, shahid beheshti university of medical sciences, tehran, iran nafiseh saadati nutrition and endocrine research center, obesity research center, research institute for endocrine sciences, shahid beheshti university of medical sciences, tehran, iran saeed sadeghian nutrition and endocrine research center, obesity research center, research institute for endocrine sciences, shahid beheshti university of medical sciences, tehran, iran

background and objectives: this study was undertaken to determine the relationship between food security and individual dietary diversity score (idds). materials and methods: this population-based cross-sectional study was conducted on 200 non-diabetic individuals aged ≥40 years, selected randomly from the tehran lipid and glucose study. household food security was measured using a validated un...

The Islamic Revolution of 1979 in Iran, led by Imam Khomeini as a religious authority, helped establish a political order whose domestic and foreign policy was based on Islamic ideology. The aim of this study was to investigate Imam Khomeini’s discourse of foreign policy in relation to national interests and security, and Islamic ideology on three levels, namely, ideology, strategy, and diploma...

2014
Thuy Ngoc Le Tok Wang Ling H. V. Jagadish Jiaheng Lu

It is well known that some XML elements correspond to objects (in the sense of object-orientation) and others do not. The question we consider in this paper is what benefits we can derive from paying attention to such object semantics, particularly for the problem of keyword queries. Keyword queries against XML data have been studied extensively in recent years, with several lowest-common-ances...

2014
Suvarna Patil Rahul Patil

Cryptographic algorithm can be used to transfer the encrypted data securely on the network. AES encryption algorithm is used in many cryptographic applications. For this, various cryptographic algorithms are used for the security of different types of data like audio or video data transfer on the network. Advanced Encryption Standard (AES) is a NIST (National Institute of Standards and Technolo...

2013
I. P. Swart

The potential impact that data leakage can have on a country, both on a national level as well as on an individual level, can be wide reaching and potentially catastrophic. In January 2013, several South African companies became the target of a hack attack, resulting in the breach of security measures and the leaking of a claimed 700000 records. The affected companies are spread across a number...

2010
Stefan Benzschawel Marcos Da Silveira

This paper describes a national eHealth platform concept with a multi-level privacy protection in order to improve the security and privacy of medical information on their storage locations as well as during the exchanging/sharing processes. The key idea is to classify and split-up data into different servers. A Trusted Third Party server manages personal identifying data together with the rela...

Journal: :Community Literacy Journal 2013

Journal: :Community Literacy Journal 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید