نتایج جستجو برای: security concern

تعداد نتایج: 277671  

2005
Chad D. Mano Aaron Striegel

Information security a is constant concern of Internet data. One security solution is IPSec, which is a set of protocols that provides both data confidentiality and authenticity. Another concern is the last mile bandwidth limitation on many Internet connections. This problem can be mitigated by bandwidth conservation techniques such as Application Layer and Stealth Multicast (SMC). Combining IP...

Journal: :Int. J. Web Service Res. 2008
Jaakko Kangasharju Tancred Lindholm Sasu Tarkoma

In the wireless world, there has recently been much interest in alternate serialization formats for XML data, mostly driven by the weak capabilities of both devices and networks. However, it is difficult to make an alternate serialization format compatible with XML security features such as encryption and signing. We consider here ways to integrate an alternate format with security, and present...

2011
Adam Corner Dan Venables Alexa Spence Wouter Poortinga Christina Demski Nick Pidgeon

Public attitudes towards nuclear power in the UK have historically been deeply divided, but as concern about climate change and energy security has exerted an increasing influence on British energy policy, nuclear power has been reframed as a low-carbon technology. Previous research has suggested that a significant proportion of people may ‘reluctantly accept’ nuclear power as a means of addres...

Journal: :CoRR 2018
Payman Behnam

With ever advancing in digital system, security has been emerged as a major concern. Many researchers all around the world come up with solutions to address various challenges that are crucial for industry and market. The aim of this survey is a brief review of challenges of security validation as well as define and classify Hardware Trojans. Then, we provide more details about various validati...

2014
Swapnil Ramesh Kumbhar

The use of artificial intelligence gives new height for human being in today’s world. The different artificial intelligence techniques give rise to important application areas where human processing ability weakens. Nowadays the security is important key concern for every nation. Use of different AI techniques in security management protects against the security attacks/threads by warning the u...

2010
Levent Ertaul Shalaja Natte Gökay Saldamli

In cellular industry, security has been a major concern for both service providers and subscribers. Service providers are primarily concerned with security to prevent fraudulent operations such as cloning or subscription fraud, while subscribers are mainly concerned with privacy issues. This paper gives a description of the access security mechanism found in CDMA2000 technology and discusses ho...

2014
Mohamed Ibrahim Mohamed Shanavas

Web Services has emerged as a dominant paradigm for constructing and composing distributed business collaborations over the web. Security is one of the major concerns when developing mission critical business applications and this concern motivates Web Services Security specifications. This paper provides the literature review on the construction of solutions to SOA attacks on SOAP based web se...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

2011
Pedro Martinez-Julia Antonio F. Gomez-Skarmeta

The most important design principle we follow in our project is to take into account the security from the beginning and thus resolve any security concern during the inception of architectural elements. This way, the final architecture has a high grade of security and, even if any element lacks some security capability, the whole solution is not affected because the roots of the architecture ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید