نتایج جستجو برای: security order

تعداد نتایج: 1066303  

One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...

1994
S. W. Smith J. D. Tygar

Partial order time expresses issues central to many problems in asynchronous distributed systems, but suffers from inherent security and privacy risks. Secure partial order clocks provide a general method to develop application protocols that transparently protect against these risks. Our previous Signed Vector Timestamp protocol provides a partial order time service with some security: no one ...

2015
David Baelde Stéphanie Delaune Lucca Hirschi

Security protocols are concurrent processes that communicate using cryptography with the aim of achieving various security properties. Recent work on their formal verification has brought procedures and tools for deciding trace equivalence properties (e.g., anonymity, unlinkability, vote secrecy) for a bounded number of sessions. However, these procedures are based on a naive symbolic explorati...

2000
Edmund M. Clarke Somesh Jha Wilfredo R. Marrero

In this paper we explore partial order reduction that make the task of verifying cryptographic protocols more efficient. These reduction techniques have been implemented in our tool BRUTUS. Although we have implemented several reduction techniques in our tool BRUTUS, due to space restrictions in this paper we only focus on partial order reductions. Partial order reductions have proved very usef...

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

ژورنال: مدیریت سلامت 2007
شجاعی, پریسا, ملکی, محمد رضا,

Introduction: When disasters occur in the hospitals, there are risks from population group sides that accordingly lack of quiet and sets upon to urgent and exit doors, makes conditions worse and also it cause to create problematic circumstance for in planning must be considered security of patients and the personnel who are on 24-hours stand by. Methods: The present survey is a descriptive stud...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

Journal: :Computers & OR 2017
Özge Safak Sinan Gürel M. Selim Akturk

Assignment of aircraft types, each having different seat capacity, operational expenses and availabilities, critically affects airlines’ overall cost. In this paper, we assign fleet types to paths by considering not only flight timing and passenger demand, as commonly done in the literature, but also operational expenses, such as fuel burn and carbon emission costs associated with adjusting the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید