نتایج جستجو برای: security order
تعداد نتایج: 1066303 فیلتر نتایج به سال:
the massive restrain security measurements at the airports very much impress the health status of the healthy and sick passengers alike. the security check is undisputedly a harassment – the confiscation of fluids, the limited movement on the airplane results in a stressful situation and put a harmful effect on healthy traveler and an even more harmful one on the sick. this kind of problem coul...
mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...
The paper analyses the security issues related to m-learning applications. The collaborative systems are classified, emphasizing on collaborative systems from the mobile learning field. The security of informatics applications is analyzed inside an m-learning system in order to reveal vulnerabilities of different applications. M-learning applications are tested in order to discover possible sec...
In the present century, the emergence of issues such as population growth, public demand for living or working in urban centers, increasing use of land have allowed for existence of high rise residential complexes necessary in most major cities of the world. Despite their benefits and advantages, high-rise residential complexes have also given rise to some limitations and threats and have gr...
China is a vast and overpopulated country in the eastern Asia whose energy security and supply is the most important factor of economic growth and consequently, economic, social and political security. By the past decades, its leaders have understood the key role of economic growth and development in the economic and political security of china. Thus, they have put all their concentration on th...
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید