نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

Journal: :Computer Communications 2022

Channel State Information (CSI)-based localization with 802.11 has been proven feasible in multiple scenarios and is becoming a serious threat to people’s privacy workplaces, at home, maybe even outdoors. Countering unauthorized without hampering communications non-trivial task, although some very recent works suggest that it marginal modification of the transmission chain, but this requires mo...

Journal: :Journal of health care law & policy 2005
Robin Fretwell Wilson

Recent reports of medical students performing pelvic exams for training purposes on anesthetized women without their consent have produced a firestorm of controversy and calls for greater regulation. Despite periodic efforts to reform the practice, such unauthorized practice is neither a recent phenomenon nor unique to the United States. Two small-scale studies published in 2003 hint at the ext...

2004
İbrahim SOĞUKPINAR Levent YALÇIN

Main goal of information system security is to protect the information by preventing unauthorized users to log on system and provide to log on system only authorized users. For this goal, it is necessary to distinguish the authorized and unauthorized users. In this study, a security method, which doesn’t require an extra hardware, was designed according to this goal. Also this system makes diff...

2013
M. Wang Y. Zhu

Content distribution in network may be vulnerable henceforth unauthorized users can inject “bogus” data to corrupt the content during its distribution process in order to deplete the network resource. Content verification is the important one to maintain integrity of the content. This is achieved by on the fly verification. Content is splitted and hashing is applied. Hashed content is sent to t...

Journal: :Inf. Sec. Techn. Report 2005
J. Stuart Broderick

Firewalls are widely deployed in most organizations connected to the Internet to implement their information security policy and to protect information from unauthorized access. Yet intruders still manage to attack systems and gain unauthorized access to information that is supposedly protected by these firewalls. This article examines some of the history and background of firewalls and what ha...

2011
Kevin Curran Jonathan Doherty Ayleen McCann KEVIN CURRAN JONATHAN DOHERTY AYLEEN MCCANN GARY TURKINGTON

The creation of strong, secure passwords is vital in our life todaydue to the implications of compromised access to our data. Passwords are commonly used to prevent unauthorized access to important information, to guarantee security of personal information, and to prevent unauthorized access to various services. It seems that people tend to veer toward adopting the simplest characters in formin...

2015
B. V. Prasanthi S Mahaboob Hussain Prathyusha Kanakam A. S. N. Chakravarthy K. C. B. Rao S. Mahaboob Hussain Harbi AlMahafzah Maen Zaid AlRwashdeh Abhishek Nagar Karthik Nandakumar Anil K. Jain

Technology advances day by day, the growth of malpractice in electronic transactions has also been increasing. Many hacking techniques for traditional passwords had come to authorize an unauthorized person while performing ATM transactions. One of the security mechanism to erase such fraudulent activities (in which an unauthorized person is performing transactions as an authorized one) is to id...

2003
Werner Dietl Andreas Uhl

Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a secret wavelet domain and discuss how this idea can be used to improve the security of watermarking schemes. Two methods to create random wavelet packet trees are discussed and analyzed. The security against unauthorized detec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید