نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2014
Mansi Goyal Richa Chhabra

Network Traffic Auditing and Assessment in Cloud Environment 1 Mansi Goyal, 2 Richa Chhabra 1 Student, 2 Faculty ITM University, Gurgaon, Haryana, India ________________________________________________________________________________________ Abstract: Cloud computing permits users to remotely store their information into the cloud and provides ondemand applications and services from a shared po...

2007
Paolo Cennamo Antonio Fresa Anton Luca Robustelli Francesco Toro Maurizio Longo Fabio Postiglione

The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

2014
Raihana Ferdous Renato Lo Cigno

Multimedia communications over IP are booming as they offer higher flexibility and more features than traditional voice and video services. IP telephony known as Voice over IP (VoIP) is one of the commercially most important emerging trends in multimedia communications over IP. Due to the flexibility and descriptive power, the Session Initiation Protocol (SIP) is becoming the root of many sessi...

Journal: :سیاست 0
علی اصغر کاظمی استاد گروه علوم سیاسی دانشکدۀ حقوق و علوم سیاسی دانشگاه آزاد اسلامی واحد علوم و تحقیقات تهران شهرام عسکری حصن دانشجوی کارشناسی ارشد گروه علوم سیاسی دانشکدۀ حقوق و علوم سیاسی دانشگاه آزاد اسلامی واحد علوم و تحقیقات تهران

in recent years the most powerful and effective negotiations to change elements of the united nations, the security council, has sparked a wide debate benefits and special privileges of members of the security council such as the right to veto the, imposing sanctions has forced some states to opposite white this order and 5 permanent members of the security council on the path to maintain the s...

Journal: :JNW 2006
Muhammad Sher Thomas Magedanz

In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standardized by 3GPP (Third Generation Partnership Project) and 3GPP2 as next generation service delivery platform developed for IP technology on top of all access networks including mobile and fixed networks. The architectur...

Journal: :African J. of Inf. & Commun. Technology 2006
Yick Hon Joseph So Jidong Wang Deddy Chandra

Mobile IP allows a mobile node to roam into a foreign IP network without losing its connection with its peer. Mobile IPv6 uses Route Optimization to improve the routing performance by avoiding the triangle routing problem and adopting Return Routability as a secure process for binding update. Host Identity Protocol (HIP) is an experimental security protocol which provides mobility management an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید