نتایج جستجو برای: security communication
تعداد نتایج: 505280 فیلتر نتایج به سال:
In recent times, smart devices, homes, manufacturing, and even cities, all of which are connected to the Internet Things (IoT) have become quite common. IoT technology heavily relies on Machine-to-Machine (M2M) communication in order make technologies behave a way. Any type connection between two devices that does not require human intervention is referred as "machine-to-machine" technology. Th...
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
cette étude tente d’étudier et de comprendre le rôle que joue l’empathie en enseignement. lempathie y est observée en tant que modèle de communication entre l’enseignant et l’élève. de façon générale, lempathie permet dassouplir les échanges entre les personnes. dans un contexte éducatif, la qualité de la communication est associée à un vécu relationnel plus harmonieux et à un meilleur climat d...
According to the problem in communication protocol security assessments, a new protocol security comprehensive evaluation method based on the threedimensional sphere model is presented. In this method, a three-dimensional security evaluation index system was built through positions of index on the external of spherical shell. Evaluation index weights of the top two levels were obtained through ...
the aim of this study is to investigate and determine the best aja’s information confrontation methods and techniques against the extra-regional forces. according researches in various sources can be realized, trans-regional forces approaches in the world of modern communications, brought under control the international community as a village and many of the information in the fields communicat...
Satellite communication is one of the most popular next generation communication technologies for global communication networks in parallel to terrestrial communication networks. In modern age military intelligence, navigation & positioning, weather forecasting, digital video Broadcasting (DVB), and broadband internet services, are the few demanding applications of Satellite communication. Alth...
Introduction: Today, the use of picture archiving and communication system (PACS) in health care centers is increasing. Meanwhile, the security of data of patients with COVID-19 in this system and control of access to such data is considerably significant. Therefore, this study aimed to evaluate the security of medical picture archiving and communication systems for recording data of COVID-19 p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید