نتایج جستجو برای: unsecured existence
تعداد نتایج: 179118 فیلتر نتایج به سال:
Cyber–Physical–Social Systems are frequently prescribed for providing valuable information on personalized services. The foundation of these services is big data which must be trustily collected and efficiently processed. Though High Performance Computing Communication technique makes great contributions to addressing the issue processing, its effectiveness still relies veracity generated from ...
This thesis consists of three empirical essays in financial economics, examining the consequences of imperfect financial markets for households, small business and house prices. In the first chapter (co-authored with Meta Brown and Brandi Coates) we explore the effect of personal bankruptcy laws on household debt. Personal bankruptcy laws in the US, and many other countries, protect a fraction ...
in his recognition of being and achievement of truth, man has two instruments in his constitution and two ways before him: intellect and heart; reasoning and intuition. some have opted the way of reasoning and underestimated intuition because of its lack of reasoning, and some have preferred intuition over reasoning because of its being presential (intuitive). with their research on philosophy ...
The online peer-to-peer (P2P) lending market, in which it is the practice of making unsecured microloans to other individual borrowers, is becoming more and more popular worldwide. In this market, information asymmetry between lenders and borrowers may create the adverse selection problem -the lenders may fund sub-prime borrowers with high risk of defaulting. In this study, we propose a model t...
Security is an obvious risk to active networking, as increased flexibility creates numerous opportunities for mischief. The point at which this flexibility is exposed, e.g., through the loading of code into network elements, must therefore be carefully crafted to ensure security. The Secure Active Network Environment (SANE) architecture provides a secure bootstrap process resulting in a module ...
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the networ...
With fast developments in digital media and communication, transmission of video data over Internet is unsecured due to various security threats. Digital video should be encrypted using any of the cryptographic methods in order to prevent security threats. Cryptography is used for encrypting and decrypting the digital data. Traditional cryptographic systems are often not enough for fast transmi...
Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used biometric features itself have to be secured. We propose a security mechanism that solves privacy related problems in 3D facial verification systems. Our solution combines PCA/LDA feature extraction with the Helper Data Sc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید