نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Journal: :IEICE Transactions 2005
Kouya Tochikubo

We propose efficient secret sharing schemes realizing general access structures. Our proposed schemes are perfect secret sharing schemes and include Shamir’s (k, n)-threshold schemes as a special case. Furthermore, we show that a verifiable secret sharing scheme for general access structures is realized by one of the proposed schemes. key words: (k, n)-threshold scheme, general access structure...

2013
S. M. Mundada

Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents report...

Journal: :Cultural diversity & ethnic minority psychology 2013
Kate E Murray David M Marx

Rates of human migration are steadily rising and have resulted in significant sociopolitical debates over how to best respond to increasing cultural diversity and changing migration patterns. Research on prejudicial attitudes toward immigrants has focused on the attitudes and beliefs that individuals in the receiving country hold about immigrants. The current study enhances this literature by e...

2015
EDA Prasanthi

The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The Protected protection mechanism is a much important concern in the case of sharing the sensitive information. The Protected protection mechanism provides better Protected for the sensitive information which is to be shared. The generally used Pr...

Journal: :Int. J. Communication Systems 2011
Mario Marchese Roberto Surlinelli Sandro Zappatore

The role of the Internet is continuously increasing and many technical, commercial, and business transactions are carried out by a multitude of users who exploit a set of specialized/sophisticated network applications. In this context, the task of network monitoring and surveillance is gaining great relevance and honeypots represent promising tools to get information, and understanding about th...

Journal: :International Journal of Computer Applications 2017

Journal: :Bulletin of the South Ural State University series "LAW" 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید