نتایج جستجو برای: security order

تعداد نتایج: 1066303  

Journal: :مجله دانشکده حقوق و علوم سیاسی 0
بهاره سازمند

association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...

Journal: :Electr. Notes Theor. Comput. Sci. 2006
Jeffrey Todd McDonald Alec Yasinsac

Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security mod...

Journal: :Journal of Middle Eastern and Islamic Studies (in Asia) 2008

2007
Anoop Singhal

Why should wait for some days to get or receive the data warehousing and data mining techniques for cyber security advances in information security book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This data warehousing and data mining techniques for...

2010
Sibylle B. Fröschle Nils Sommer

PKCS#11 is a widely adopted standard that defines a security API for accessing devices such as smartcards and hardware security modules. Motivated by experiments on several devices we develop an approach that allows us to formally establish security properties of keys stored on such devices. We use first-order linear time logic extended by past operators. The expressiveness of a first-order lan...

2015
Junqing Gong Jie Chen Xiaolei Dong Zhenfu Cao Shaohua Tang

The notion of extended nested dual system groups (ENDSG) was recently proposed by Hofheinz et al. [PKC 2015] for constructing almost-tight identity based encryptions (IBE) in the multi-instance, multi-ciphertext (MIMC) setting. However only a composite-order instantiation was proposed and more efficient prime-order instantiations are absent. The paper fills the blank by presenting two construct...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید