نتایج جستجو برای: have always brought about security challenge

تعداد نتایج: 3825509  

Journal: :سیاست 0
داود فیرحی استاد گروه علوم سیاسی دانشکدة حقوق و علوم سیاسی دانشگاه تهران

religion and politics in muslim world are like two next-door neighbors. current developments in the region, no matter they named as arab spring, islamic awakening or radicalism stress the mentioned fact. however, involvement of religion in politics is not inappropriate at all, probably these two are janus-faced and they have synchronically showed tendency to each other: constructive and destruc...

2010

do not always match with others and whose individual information systems often differ. This inherent complexity can create a degree of fragmentation, causing lowered service levels and increased operational costs. In addition to the operational challenge, further pressure on IT systems development and maintenance is caused by legislation on security and customs, and ongoing change in customer r...

VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...

2014
Deepika Dhiman

Wireless network is widely used in many sectors due to ease of installation, flexibility, mobility, reduced cost-of-ownership, and scalability. WiFi network can be accessed with laptops, mobile phones, cameras, game consoles and many other increasing numbers of consumer electronic gadgets. Wireless Local Area Network (WLAN) technology has changed the way people communicate and share information...

Journal: :CAIS 2007
Manoj Parameswaran Andrew B. Whinston

A collection of technologies termed social computing is driving a dramatic evolution of the Web, matching the dot-com era in growth, excitement, and investment. All of these share a high degree of community formation, user level content creation, and a variety of other characteristics. We provide an overview of social computing and identify salient characteristics. We argue that social computin...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1389

rivers and runoff have always been of interest to human beings. in order to make use of the proper water resources, human societies, industrial and agricultural centers, etc. have usually been established near rivers. as the time goes on, these societies developed, and therefore water resources were extracted more and more. consequently, conditions of water quality of the rivers experienced rap...

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

2013
Dr. Chander Kant Raksha

Securing biometrics databases from being compromised is major challenge, it must be overcome in order to support widespread use of biometrics based authentication. In this paper we present a cryptographic technique for enhanced security of fingerprint information using RC4 enrichment algorithm approach. RC4 algorithm is already used for image encryption. This paper is about encryption and decry...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید