نتایج جستجو برای: keywords national security
تعداد نتایج: 2442661 فیلتر نتایج به سال:
national security and the different modalities used by states to guarantee and promote it may be considered as a most complex responsibility of governments. although there are different environmental conditions attributed to this notion and there exist a variety of definitions for it, us policy-makers have expanded the transnational application(s) of this concept on a daily basis. the following...
Key management is a vital component in any modern security protocol. Due to scalability and practical implementation considerations automatic key management seems a natural choice in significantly large virtual private networks (VPNs). In this context IETF Internet Key Exchange (IKE) is the most promising protocol under permanent review. We have made a humble effort to pinpoint IKEv2 net gain o...
background and objectives: this study was undertaken to determine the relationship between food security and individual dietary diversity score (idds). materials and methods: this population-based cross-sectional study was conducted on 200 non-diabetic individuals aged ≥40 years, selected randomly from the tehran lipid and glucose study. household food security was measured using a validated un...
The Islamic Revolution of 1979 in Iran, led by Imam Khomeini as a religious authority, helped establish a political order whose domestic and foreign policy was based on Islamic ideology. The aim of this study was to investigate Imam Khomeini’s discourse of foreign policy in relation to national interests and security, and Islamic ideology on three levels, namely, ideology, strategy, and diploma...
It is well known that some XML elements correspond to objects (in the sense of object-orientation) and others do not. The question we consider in this paper is what benefits we can derive from paying attention to such object semantics, particularly for the problem of keyword queries. Keyword queries against XML data have been studied extensively in recent years, with several lowest-common-ances...
Cryptographic algorithm can be used to transfer the encrypted data securely on the network. AES encryption algorithm is used in many cryptographic applications. For this, various cryptographic algorithms are used for the security of different types of data like audio or video data transfer on the network. Advanced Encryption Standard (AES) is a NIST (National Institute of Standards and Technolo...
The potential impact that data leakage can have on a country, both on a national level as well as on an individual level, can be wide reaching and potentially catastrophic. In January 2013, several South African companies became the target of a hack attack, resulting in the breach of security measures and the leaking of a claimed 700000 records. The affected companies are spread across a number...
This paper describes a national eHealth platform concept with a multi-level privacy protection in order to improve the security and privacy of medical information on their storage locations as well as during the exchanging/sharing processes. The key idea is to classify and split-up data into different servers. A Trusted Third Party server manages personal identifying data together with the rela...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید