نتایج جستجو برای: security sense

تعداد نتایج: 322501  

Journal: :IEICE Transactions 2017
Hidenori Kuwakado Masazumi Kurihara

This paper proposes secure regenerating codes that are composed of non-secure regenerating codes and a new all-or-nothing transform. Unlike the previous analysis of secure regenerating codes, the security of the proposed codes is analyzed in the sense of the indistinguishability. The advantage of the proposed codes is that the overhead caused by the security against eavesdropping is much less t...

2005
Kevin Gravesande Rasal Mowla Alvaro Restrepo Carlos Thomas Scott Weaver

On February 7, 2005, the Federal Trade Commission reported that at least 10 million Americans are affected by identity (ID) theft each year[7]. The US Department of Justice defines identity theft as ”all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain[17].” ID thieves target any ...

ژورنال: مدیریت شهری 2016
Daneshnejad, Azam, Matin, Mehrdad ,

Plants as the life giving entities have important role in mental and physical health of human. In the modern time with expansion of the cities and increase  of industrial centers and living style change and decrease of social negligence about green spaces as the factor for mental diseases, altogether have been propounded for many psychologists and physicians. In this way considering green space...

2006
Ryotaro Hayashi Keisuke Tanaka

Bellare, Boldyreva, Desai, and Pointcheval [2] proposed a new security requirement of encryption schemes called “key-privacy” or “anonymity.” It asks that an encryption scheme provides privacy of the key under which the encryption was performed. That is, if an encryption scheme provides the key-privacy, then the receiver is anonymous from the point of view of the adversary. They formalized the ...

2013
Leonie Huddy Stanley Feldman Christopher Weber

We draw on data from a national RDD telephone sample of 1549 adult Americans conducted between October 15, 2001 and March 2, 2002 to explore the impact of a need for security on support for national security policies in the aftermath of the 911 terrorist attacks. In past research, an external threat has been assumed to have uniform impact on an affected population, a claim that has met with gro...

2004
Kris Tiri Ingrid Verbauwhede

A Charge Recycling Sense Amplifier Based Logic is presented. This logic is derived from the Sense Amplifier Based Logic, which is a logic style with signal independent power consumption. It has been proven previously to protect security devices such as Smart Cards against power attacks. Experimental results show that the use of advanced circuit techniques, which enable charge recycling and inte...

2014
Dennis Hofheinz Andy Rupp

Suppose many messages are encrypted using a public-key encryption scheme. Imagine an adversary that may adaptively ask for openings of some of the ciphertexts. Selective opening (SO) security requires that the unopened ciphertexts remain secure, in the sense that this adversary cannot derive any nontrivial information about the messages in the unopened ciphertexts. Surprisingly, the question wh...

Shiraz has precious historical textures that various parts and objects have been added to during contemporary city developments that these process and changes sometimes damaging its identity. Since historic textures have turned to lose identity, land prices drop down, main and old residents departure, new residents are disruptively interfering urban and architectural interventions. Today, the e...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

Journal: :journal of computing and security 0
bahman rajabi shahid beheshti university, g.c., tehran, iran ziba eslami department of computer science, shahid beheshti university, g.c., tehran, iran

in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید