نتایج جستجو برای: government protocol
تعداد نتایج: 377577 فیلتر نتایج به سال:
wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...
The first work on email security began in 1984, which resulted the Privacy Enhanced Mail (PEM) specifications. Two years later, was done as part of Secure Data Network System (SDNS) sponsored by U.S. Government, resulting Message Security Protocol (MSP). PEM and MSP both influenced development most popular Internet protocol, is MIME (S/MIME). This article provides insight into early history sec...
Wide deployment of e-government infrastructure is one of the major national projects in China. Significant progress has been made since the launch of this project in 2003. Three key issues have been extensively investigated. First, an efficient and reliable e-government platform should be constructed to avoid isolated information and application islands. Second, this project aims to establish a...
OBJECTIVE To measure level and variation of healthcare quality provided by different types of healthcare facilities in Ghana and Kenya and which factors (including levels of government engagement with small private providers) are associated with improved quality. DESIGN Provider knowledge was assessed through responses to clinical vignettes. Associations between performance on vignettes and f...
0
Logistic regression is an important statistical analysis methods widely used in research fields, including health, business and government. On the other hand preserving data privacy is a crucial aspect in every information system. Many privacy-preserving protocols have been proposed for different statistical techniques, with various data distributions, owners and users. In this paper, we propos...
In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple parallel edges (called wires), each of which are directed from S to R or vice-versa. The unreliability of the network is modeled by an Byzantine adversary with infinite power. Thus the security we gain is information theoretic. We ...
The Communicable Diseases Network Australia (CDNA) consists of communicable disease authorities from various Australian Government agencies and state and territory health authorities, in addition to expert bodies and individuals in the specifi c areas of communicable disease epidemiology, clinical management, disease control and laboratory diagnosis. The CDNA provides national public health lea...
objective: to compare the pregnancy outcomes achieved by in vitro fertilization (ivf) between minimal stimulation and conventional antagonist protocols in poor ovarian responders (pors). materials and methods: in this randomized controlled trial, 77 pors undergoing ivf were selected and divided into two groups. first group was the minimal stimulation group (n = 42) receiving 100 mg/day clomiphe...
today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when there is a connection between user a and b, user a shoul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید