نتایج جستجو برای: keywords proxy war

تعداد نتایج: 2039825  

Journal: :Fairness and Justice: Jurnal Ilmiah Ilmu Hukum 2019

2016
KOMURA Takaaki

We propose a web forward proxy server with authentication method using Shibboleth. With this proxy Single Sign-On would benefit a user and also authentication using Shibboleth protocol solves problems in basic access authentication and digest access authentication supported by existing web forward proxy servers. In order to realize it, the proxy needs to recognize attributes of shibboleth proto...

Journal: :فصلنامه تخصصی جنگ ایران و عراق 0
عبدالله فاتحی

through a decree of imam khomeini, the jihad-e sazandegi organ was formed in 1979 with the aim of rebuilding rural regions and providing services to the deprived areas. initially, it was not thought the jihad to be also involved in uncivil activities as well, but with the beginning of the conflicts before the imposed war and then the war itself, the necessaries required this organization to do ...

2011
Chi-Yu Li Ioannis Pefkianakis Songwu Lu Bojie Li Chenghui Peng Wei Zhang

In this paper, we present a new transport protocol TSMP, which seeks to support data transfer for the emerging usage paradigm of ”single user, multiple devices” in a TCP compatible manner. Through its novel naming and proxy-based designs, TSMP is able to retain the current client and server protocol operations of the legacy TCP protocol and TCP-based applications while placing new functions at ...

Journal: :IACR Cryptology ePrint Archive 2004
Jing Xu Zhenfeng Zhang Dengguo Feng

Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In a (t, n) threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperati...

2016
Basavaprabhu

A Cloud data storage system consists of collection of storage servers over the internet which provides long term storage services. The data stored in a third party’s cloud system may cause serious concern over data confidentiality. To keep sensitive user data confidential against un-trusted servers and to provide security, access control in cloud there are some cryptographic techniques speciall...

2014
Sattar J. Aboud

The threshold proxy signature scheme allows the original signer to delegate a signature authority to the proxy group to cooperatively sign message on behalf of an original signer. In this paper, we propose a new scheme which includes the features and benefits of the RSA scheme. Also, we will evaluate the security of undeniable threshold proxy signature scheme with known signers. We find that th...

2009

Combining and analyzing data collected at multiple administrative locations is critical for a wide variety of applications, such as detecting malicious attacks or computing an accurate estimate of the popularity of Web sites. However, legitimate concerns about privacy often inhibit participation in collaborative data aggregation. In this paper, we design, implement, and evaluate a practical sol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید