نتایج جستجو برای: especially by designing a key question

تعداد نتایج: 14958091  

2012
Alaa Fahmy

Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard, and keeping the keys secret is much harder. Cryptanalysts usually attack both symmetric and public key cryptosystems through ...

Journal: :مطالعات حقوق خصوصی 0
سید علی سادات اخوی دانشگاه تهران حوریه حسینی اکبر نژاد دانشگاه تهران

article 1 of the european convention on human rights provides that the contracting parties shall secure to everyone ‘within their jurisdiction’ the rights and freedoms defined in the convention. at a technical level, the key question is how one should interpret the word ‘jurisdiction’ in article 1. this article plays a key role in the convention system since it sets out the limits on the obliga...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2005

The paper reviews, first of all, the Church attitude towards poverty and unemployment, through the Church Social Instruction most representative documents (Laborem exercens, Gaudium et spes, Sollicitudo rei socialis, Centesimus annus). Then, distinguish microcredit concept in developing and developed countries. The microcredit chances in poverty reduction is analysed under the financial system ...

2012
Debajit Sensarma Subhashis Banerjee Krishnendu Basuli

** (West Bengal University of Technology, West Bengal, India) *** (West Bengal State University, West Bengal, India) ABSTRACT Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard,...

Journal: :Journal of the Illuminating Engineering Institute of Japan 1987

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه شیمی و مهندسی شیمی ایران - پژوهشکده شیمی تجزیه و معدنی 1390

hydrochlorothiazide (hct) is a diuretic agent which is shown to be effective in the treatment of hypertension. literature reports have demonstrated that urinary excretion data may be used to assess the bioavailability of various formulations containing this thiazide. also hct consumption by the athletes is one of the drugs which should be regulated by world anti-doping agency (wada), because of...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

learning-oriented assessment seeks to emphasise that a fundamental purpose of assessment should be to promote learning. it mirrors formative assessment and assessment for learning processes. it can be defined as actions undertaken by teachers and / or students, which provide feedback for the improvement of teaching and learning. it also contrasts with equally important measurement-focused appro...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - پژوهشکده ادبیات 1391

the major purpose of this study was to develop the translation teacher competency test (ttct) and examine its construct and predictive validity. the present study was conducted in two phases: a qualitative phase as well as a quantitative phase. in the first phase of the study, the author attempted to find out the major areas of competency required for an academic translation teacher. the second...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید