نتایج جستجو برای: secure
تعداد نتایج: 56843 فیلتر نتایج به سال:
Iterative methods are a standard technique in many areas of scientific computing. The key idea is that function applied repeatedly until the resulting sequence converges to correct answer. When applying such secure computation methodology (for example using MPC, FHE, or SGX) one either needs perform enough steps ensure convergence irrespective input data, test within algorithm, and this itself ...
Increasing automation and external connectivity in industrial control systems (ICS) demand a greater emphasis on software-level communication security. In this article, we propose secure-by-design development method for building ICS applications, where requirements from security standards like ISA/IEC 62443 are fulfilled by design-time abstractions called secure links. Proposed as an extension ...
the aim of this study was to investigate the relationships between attachment styles (secure, avoidant and ambivalent) and satisfying basic psychological needs of children (independence, competence and relevance) with regard to mothers’ employment status. the subjects included 409 high school students selected randomly by multi-stage cluster sampling method. instruments were: attachment styles ...
this study has investigated smallholder farmers’ household food security level in mazandaran province during the two times i.e pre-harvest period and post-harvest period. using krejcie and morgan’s detrmining sample table, 384 farmers selected as a sample. a multi-stage sampling technique was used to select preciously subjects. household food insecurity access scale (hfias) was the main tool fo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید