نتایج جستجو برای: private key search

تعداد نتایج: 913761  

Journal: :IEEE Journal on Selected Areas in Communications 2001
Rebecca Issacs Ian Lesile

This paper describes VServ, a prototype architecture for a virtual private network (VPN) service, which builds and manages VPNs on demand. It allows each VPN to have guaranteed resources and customized control, and supports a highly dynamic VPN service where creation and modification operations can take place on fast timescales. These features are contingent on the automated establishment and m...

Journal: :Journal of Direct, Data and Digital Marketing Practice 2008

Journal: :Inf. Sci. 2012
Josep Domingo-Ferrer Úrsula González-Nicolás

User profiling in web search has the advantage of enabling personalized web search: the quality of the results offered by the search engine to the user is increased by taking the user’s interests into account when presenting those results. The negative side is that the interests and the query history of users may contain information considered as private; hence, technology should be provided fo...

2015
Shyamala Devi Munisamy Arun Chokkalingam

Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opp...

Journal: :Revista Amazonia Investiga 2021

The need to attract resources socially significant infrastructure facilities, decentralize authority, market orientation of public services, efficiency and competition requires the search for a combination opportunities cooperation between private sectors. A public-private partnership has become one modern approaches implementation important projects. study identified degree impact state busine...

Journal: :Computer Networks 1999
Refik Molva

Fear of security breaches has been a major reason for the business world’s reluctance to embrace the Internet as a viable means of communication. A widely adopted solution consists of physically separating private networks from the rest of Internet using firewalls. This paper discusses the current cryptographic security measures available for the Internet infrastructure as an alternative to phy...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید