نتایج جستجو برای: secure

تعداد نتایج: 56843  

ژورنال: رویش روانشناسی 2023

The aim of the present study was to investigate the role of secure bonding, relationship care, and work-family balance in predicting the marital disaffection of married teachers during the Covid-19 quarantine period. The present research method is a correlational description. The statistical population included all the teachers of Semnan province in 1400, whose number was reported to be 8370. 3...

2013
Sheng-Gwo Chen Chuan-Sheng Wei Feng Chia Tone-Yau Huang

Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.’s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some ...

2011
Yan Huang Peter Chapman David Evans

Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the researc...

Journal: :CoRR 2011
Chuan-Sheng Wei Sheng-Gwo Chen Tone-Yau Huang Yao Lin Ong

Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.’s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some ...

Journal: :سیاست 0
علی اکبر نیکواقبال استادیار گروه اقتصاد اجتماعی دانشکده اقتصاد دانشگاه تهران حسین پوزش شیرازی کارشناس ارشد سیاستگذاری عمومی دانشکده حقوق و علوم سیاسی دانشگاه تهران اباذر براری کارشناس ارشد روابط بین الملل دانشکده حقوق و علوم سیاسی دانشگاه تهران

the purpose of establishing foreign reserves account in iran was mainly to secure iran's economy from the oil's price changes. it was to compensate for oil price reduction. but foreign reserves account withdrew excessively and did not allocate it optimally. that's why; it went for away from its practical purpose. this study focuses on the use of official assessment pattern to rev...

Journal: :Attachment & human development 2009
Susan S Woodhouse Matthew J Dykas Jude Cassidy

The present study examined three sets of questions about secure base provision in the context of the family, including (1) relations between inter-parental perceptions of secure base provision and parents' adult romantic attachment and marital satisfaction, (2) interrelations among family members' perception of secure base provision, and (3) links between both adolescents' and parents' percepti...

1999
Goichiro Hanaoka Tsuyoshi Nishioka Yuliang Zheng Hideki Imai

E cient ID based key sharing schemes are desired world widely for secure communica tions on Internet and other networks The Key Predistiribution Systems KPS are a large class of such key sharing schemes The remarkable property of KPS is that in order to share the key a participant should only input its partner s identi er to its secret KPS algorithm Although it has a lot of advantages in terms ...

2017
Yunan Chen Charlotte Tang Victoria Duong Victor Ngo Yang Huang John E. Mattison

This study explores the use of phone and secure messaging via an online patient portal in mediating the communication between patients and their healthcare providers. In analyzing the messages handling processes, we found that although both phone and secure messages were answered in similar manners, the interplay of the frontand back-end roles in collaborative work resulted in patients’ prefere...

2012
Vivienne Farrell Graham Farrell

For 25 years we have watched and nurtured the growth of B2C eCommerce with first time consumers, however consumer surveys are indicating that we are losing ground with previous customers who are vowing not to return. Consumers state that they perceive a lack of confidence and trust that the vendor will provide a safe and secure environment. In the early stages of development much research into ...

Journal: :Theor. Comput. Sci. 2005
Steven S. Seiden Peter P. Chen Robert F. Lax Jianhua Chen Guoli Ding

We consider anonymous secure communication, where parties not only wish to conceal their communications from outside observers, but also wish to conceal the very fact that they are communicating. We consider the bus framework introduced by Beimel and Dolev [2], where messages are delivered by a bus traveling on a random walk. We generalize this idea to consider more than one bus. We show that i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید