نتایج جستجو برای: key

تعداد نتایج: 553708  

Journal: :بحوث فی اللغه العربیه 0
عبدالرسول غفاری دانشگاه کاشان

â  a geographical dimension in the poetry of de’bil al- khozaee â  â  abdul rasoul ghaffari * â  â abstractâ in this article, we attempt to study de'bil al-khozaee's poetry. we find him a person who travelled a lot around the west and the east of islamic world. in his journey, he acquired knowledge, belles-letters, morals and also wealth. what is important for us in this research is...

Journal: :persian journal of acarology 0
javad noei department of plant protection, faculty of agricultural, university of birjand, birjand, iran mostafa maroufpoor assistant professor department of plant protection, agriculture faculty, university of kurdistan fardin faizi department of plant protection, faculty of agriculture, university of tehran, karaj, iran hadi ostovan department of entomology, shiraz branch, islamic azad university, shiraz, iran

erythraeus (zaracarus) coleopterus mortazavi, hajiqanbar & saboori, 2012 (acari: parasitengona: erythraeidae) was described based on a single specimen from kerman province, southeastern iran, associated with a scarabaeid beetle, cyphonoxia sp. (coleoptera: scarabaeidae). this species reports for the second time from stored grain (off host) in saqqez and baneh cities, kurdistan province, western...

Journal: :mycologia iranica 2014
mohammad reza asef

this study is a review on the genus helvella (pezizales, helvellaceae) in iran. study on samples deposited in iran fungal herbarium along with the fresh materials collected by the author revealed that seven species of helvella, h. acetabulum, h. atra, h. crispa, h. elastica, h. ephippium, h. lacunosa and h. leucopus (as h. monachella) have already been reported from iran. three other species vi...

2002
Yevgeniy Dodis Jonathan Katz Shouhuai Xu Moti Yung

Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...

Journal: :بحوث فی اللغه العربیه 0
سیدمحمد امیری استادیار گروه زبان و ادبیات عربی، دانشگاه آزاد ـ نجف آباد.

abstractibn-nubatah is one of the poets of deterioration era who lived at this time so hispoetry has the trace of both the imitation and repetition of the poets of that time. heused a kind of poetic theme in his poems that lacks the privilege and typicality of agood poem because he imitated some poets like emre'al- qays, tarafah ibn al-a’bd,khansa, hassan ibn sabet al-ansary, ka’b ibn ...

Journal: :journal of computer and robotics 0
mohammad mehdi gilanian sadeghi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...

Journal: :I. J. Network Security 2008
Said Gharout Yacine Challal Abdelmadjid Bouabdallah

In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications require confidentiality for transmitted data. So, a traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occur...

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

2002
Bin Sun Wade Trappe Yan Sun K. J. Ray Liu

Group-oriented services are attractive to both customers and service providers since they allow for potential markets that exploit user collaboration and shared experiences. In order to protect the content of a group service, the content must be encrypted using a key shared by group members. With the advancement of network technologies, customers will access group services from different networ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید