نتایج جستجو برای: security order

تعداد نتایج: 1066303  

Journal: :Economic and social changes: facts, trends, forecast / Экономические и социальные перемены: факты, тенденции, прогноз 2017

Journal: :international journal of travel medicine and global health 0
peter p. felkai head of department, travel medicine chair, internal medicine faculty, debrecen medical school, hungary

the massive restrain security measurements at the airports very much impress the health status of the healthy and sick passengers alike. the security check is undisputedly a harassment – the confiscation of fluids, the limited movement on the airplane results in a stressful situation and put a harmful effect on healthy traveler and an even more harmful one on the sick. this kind of problem coul...

Journal: :journal of computer and robotics 0
soheila mirzagholi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran karim faez electrical engineering department, amirkabir university of technology, tehran, iran

mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

Kooroush Manochehri Sahar Darvish Motevali

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

NAZANIN PILEVERI SOMAYYEH SHAFEGHATI

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: -webkit-left; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; ba...

2013
Paul POCATILU Cristian CIUREA Mihai DOINEA

The paper analyses the security issues related to m-learning applications. The collaborative systems are classified, emphasizing on collaborative systems from the mobile learning field. The security of informatics applications is analyzed inside an m-learning system in order to reveal vulnerabilities of different applications. M-learning applications are tested in order to discover possible sec...

In the present century, the emergence of issues such as population growth, public demand for living or working in urban centers, increasing use of land have allowed for existence of high rise residential complexes necessary in most major cities of the world. Despite their benefits and advantages, high-rise residential complexes have also given rise to some limitations and threats and have gr...

China is a vast and overpopulated country in the eastern Asia whose energy security and supply is the most important factor of economic growth and consequently, economic, social and political security. By the past decades, its leaders have understood the key role of economic growth and development in the economic and political security of china. Thus, they have put all their concentration on th...

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید