نتایج جستجو برای: key
تعداد نتایج: 553708 فیلتر نتایج به سال:
â a geographical dimension in the poetry of deâbil al- khozaee â â abdul rasoul ghaffari * â â abstractâ in this article, we attempt to study de'bil al-khozaee's poetry. we find him a person who travelled a lot around the west and the east of islamic world. in his journey, he acquired knowledge, belles-letters, morals and also wealth. what is important for us in this research is...
erythraeus (zaracarus) coleopterus mortazavi, hajiqanbar & saboori, 2012 (acari: parasitengona: erythraeidae) was described based on a single specimen from kerman province, southeastern iran, associated with a scarabaeid beetle, cyphonoxia sp. (coleoptera: scarabaeidae). this species reports for the second time from stored grain (off host) in saqqez and baneh cities, kurdistan province, western...
this study is a review on the genus helvella (pezizales, helvellaceae) in iran. study on samples deposited in iran fungal herbarium along with the fresh materials collected by the author revealed that seven species of helvella, h. acetabulum, h. atra, h. crispa, h. elastica, h. ephippium, h. lacunosa and h. leucopus (as h. monachella) have already been reported from iran. three other species vi...
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by secret-key exposures. In our model, the secret k...
abstractibn-nubatah is one of the poets of deterioration era who lived at this time so hispoetry has the trace of both the imitation and repetition of the poets of that time. heused a kind of poetic theme in his poems that lacks the privilege and typicality of agood poem because he imitated some poets like emre'al- qays, tarafah ibn al-aâbd,khansa, hassan ibn sabet al-ansary, kaâb ibn ...
the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...
In the last few years, multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. Some multicast applications require confidentiality for transmitted data. So, a traffic encryption key is used to assure this confidentiality and has to be changed and distributed to all valid members whenever a membership change (join or leave) occur...
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
Group-oriented services are attractive to both customers and service providers since they allow for potential markets that exploit user collaboration and shared experiences. In order to protect the content of a group service, the content must be encrypted using a key shared by group members. With the advancement of network technologies, customers will access group services from different networ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید