نتایج جستجو برای: secure

تعداد نتایج: 56843  

Journal: :international journal of communications and information technology 2011
s. ehrampoosh a. mahani

in mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.since all nodes in the manets would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. so evaluating the perf...

Journal: :IEEE Micro 2019

Journal: :Nature 1992

Journal: :مجله روان شناسی و علوم تربیتی 0
محمد علی بشارت کیومرث کریمی عباس رحیمی نژاد

the main purpose of this research was 10 study the relationship between attachment styles (secure. avoidant, ambivalent) and personality dimensions (neuroticism. extraversion, openness, agreeableness. consciousness) . two hundred and thirty three students ( 102 male. 131 female ) from the university of tehran participated in this study . adult attachment inventory (aai) was applied for measurin...

Journal: :The Journal of Object Technology 2005

Journal: :IEEE Transactions on Dependable and Secure Computing 2005

ژورنال: اعتیاد پژوهی 2010
رستمی, محمّد , قائم‌مقامی, مریم , محمّدعلی پو, زینب ,

Objective: Current challengeable life, faces young with varied damages. The Purpose of this research was appointment of role of attachment styles in the risky behaviors of students. Method: the method of the project was attachment in descriptive ones. 273 people of students were selected via several stage cluster sample, and answered to questionner of adult attachment and risky behaviors. Resu...

Journal: :journal of computing and security 0
bahman rajabi shahid beheshti university, g.c., tehran, iran ziba eslami department of computer science, shahid beheshti university, g.c., tehran, iran

in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...

The attachment styles are the basis of a healthy family. Therefore, the purpose of this study was to predict family function and quality of life according to the attachment styles among couples of Shiraz. The research method is correlation. The statistical population of this study was all couples married in Shiraz in the year of (1396-97) who were selected by random sampling method. Epstein, Bi...

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید