نتایج جستجو برای: unsecured existence

تعداد نتایج: 179118  

Journal: :The Journals of Gerontology Series B: Psychological Sciences and Social Sciences 2014

Journal: :Journal of Systems Architecture 2021

Cyber–Physical–Social Systems are frequently prescribed for providing valuable information on personalized services. The foundation of these services is big data which must be trustily collected and efficiently processed. Though High Performance Computing Communication technique makes great contributions to addressing the issue processing, its effectiveness still relies veracity generated from ...

2014
Felipe Severino

This thesis consists of three empirical essays in financial economics, examining the consequences of imperfect financial markets for households, small business and house prices. In the first chapter (co-authored with Meta Brown and Brandi Coates) we explore the effect of personal bankruptcy laws on household debt. Personal bankruptcy laws in the US, and many other countries, protect a fraction ...

Journal: :فلسفه و کلام 0
سید مرتضی حسینی شاهرودی رسول حسین پور

in his recognition of being and achievement of truth, man has two instruments in his constitution and two ways before him: intellect and heart; reasoning and intuition. some have opted the way of reasoning and underestimated intuition because of its lack of reasoning, and some have preferred intuition over reasoning because of its being presential (intuitive). with their research on philosophy ...

2014
Lei Yang Vincent Siu-king Lai

The online peer-to-peer (P2P) lending market, in which it is the practice of making unsecured microloans to other individual borrowers, is becoming more and more popular worldwide. In this market, information asymmetry between lenders and borrowers may create the adverse selection problem -the lenders may fund sub-prime borrowers with high risk of defaulting. In this study, we propose a model t...

1998
D. Scott Alexander William A. Arbaugh Angelos D. Keromytis Jonathan M. Smith

Security is an obvious risk to active networking, as increased flexibility creates numerous opportunities for mischief. The point at which this flexibility is exposed, e.g., through the loading of code into network elements, must therefore be carefully crafted to ensure security. The Secure Active Network Environment (SANE) architecture provides a secure bootstrap process resulting in a module ...

Journal: :CoRR 2014
Priyanka Bhatia Ronak Sumbaly

Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the networ...

2013
JOHN SINGH

With fast developments in digital media and communication, transmission of video data over Internet is unsecured due to various security threats. Digital video should be encrypted using any of the cryptographic methods in order to prevent security threats. Cryptography is used for encrypting and decrypting the digital data. Traditional cryptographic systems are often not enough for fast transmi...

2008
Daniel Hartung

Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used biometric features itself have to be secured. We propose a security mechanism that solves privacy related problems in 3D facial verification systems. Our solution combines PCA/LDA feature extraction with the Helper Data Sc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید