نتایج جستجو برای: hardware security ip protection security path

تعداد نتایج: 611393  

2012
Sumedha Kaushik Ankur Singhal

Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...

2003
Xiaoming Fu Henning Schulzrinne Hannes Tschofenig

Internet signaling protocols establish, maintain and remove state along the data path. Next-generation signaling protocols design must meet the scaling requirements imposed by the various tasks of the Internet signaling applications, such as resource reservation and middlebox configuration, and to meet the demand for general functionality in signaling protocols, including strong security, relia...

Journal: :IACR Cryptology ePrint Archive 2008
Anoop M. S.

The paper discusses the hardware and software security requirements in an embedded device that are involved in the transfer of secure digital data. The paper gives an overview on the security processes like encryption/decryption, key agreement, digital signatures and digital certificates that are used to achieve data protection during data transfer. The paper also discusses the security require...

2009
Mahalingam Ramkumar

Collusion susceptible key predistribution schemes (KPS) are trade-offs between complexity and security. Measures of complexity include storage, computation and bandwidth overhead; a measure of security is their collusion resistance. Probabilistic KPSs (P-KPS) have some unique advantages in application scenarios where hardware assisted protection of secrets is mandatory. To facilitate a quantita...

2000
Madalina Baltatu Antonio Lioy

This paper presents the network level security services currently available for the Internet infrastructure. Since IPsec is likely to become the largely accepted standard as far as IP level security is concerned, the paper describes the IPsec architecture including its defined security formats and the related key management procedures. Finally, common IPsec applications are presented and the fu...

Journal: :مدیریت اطلاعات سلامت 0
اعظم السادات حسینی استادیار، مدیریت اطلاعات بهداشتی درمانی، دانشگاه علوم پزشکی شهید بهشتی، تهران، ایران حمید مقدسی دانشیار، مدیریت اطلاعات بهداشتی درمانی، دانشگاه علوم پزشکی شهید بهشتی، تهران، ایران فرخنده اسدی استادیار، مدیریت اطلاعات بهداشتی درمانی، دانشگاه علوم پزشکی شهید بهشتی، تهران، ایران مژگان کریمی کارشناس ارشد، آموزش مدارک پزشکی، دانشگاه علوم پزشکی شهید بهشتی، تهران، ایران.

background: hospitals employing telesurgery need to be evaluated to determine whether they satisfy the international standards. the main goal of this research was to assess the software, hardware, telecommunication equipments, privacy and security methods, and staffing requirements for supporting and executing telesurgery in hospitals affiliated to tehran universities of medical sciences, tehra...

2014
Satyajeet Nimgaonkar Mahadevan Gomathisankaran Saraju Mohanty

Security is a primary concern in this era of pervasive computing. Software-only protection mechanisms provide inadequate security as the Operating System becomes the root of trust and also due to their inability to guard against physical attacks on computing devices. On the contrary, hardware based security mechanisms facilitate the construction of trustworthy secure systems. However, existing ...

2016
Maththaiya Durai Behnam S. Arad

Data security is a major concern for everyone in today’s informational world. Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. It is one of the major information security solutions. Hash Stream1-Synthetic Initialization Vector (HS1-SIV) is a recently developed and fast encryption algorithm. In this paper1, we present a hardwar...

Journal: :مطالعات حقوق خصوصی 0
فیروز اصلانی دانشکده حقوق و علوم سیاسی، دانشگاه تهران محمود فرد کاردل دانشکده حقوق و علوم سیاسی، دانشگاه تهران

for each country, national security in the most urgent and significant value and need, so each government tries to justify its policies and strategies in order to reach and preserve national security. acquiring national security is, people should share national interests by haying health, land integrity, independence, power, credits and all the values generally. they should be sure of this secu...

2013
Mahboobeh Zangiabady

Computer networks are complex systems, often routing hundreds, thousands, or even millions of data packets every second. Therefore, in order for networks to handle large amounts of data, it is important that the data routes efficiently. So, the need for security management and protecting data become evident in networks. IP network recovery defines Clusters, or multiple computers that work toget...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید