نتایج جستجو برای: secure

تعداد نتایج: 56843  

Journal: :Decision Support Systems 2004
Sai Ho Kwok Christopher C. Yang Kar Yan Tam Jason S. W. Wong

Building digital rights management (DRM) systems for electronic commerce is still a complex task because such systems are usually required to manage a large set of different media contents, rights information, and enabling technologies. The Secure Digital Music Initiative (SDMI) was proposed to provide a secure environment in which rights management is performed for music distribution through t...

Journal: :iranian journal of medical sciences 0
ali firoozabadi research center for psychiatry and behavioral sciences, department of psychiatry, school of medicine, hafez hospital, shiraz university of medical sciences, shiraz, iran zabihollah abedi research center for psychiatry and behavioral sciences, department of psychiatry, school of medicine, hafez hospital, shiraz university of medical sciences, shiraz, iran roqayeh aliyari department of biostatistics, school of health, shahroud university of medical sciences, shahroud, iran behzad zolfaghari department of pharmacognosy, school of pharmacy and pharmaceutical sciences, isfahan university of medical sciences, isfahan, iran ahmad ghanizadeh research center for psychiatry and behavioral sciences, department of psychiatry, school of medicine, hafez hospital, shiraz university of medical sciences, shiraz, iran

abstract background: attachment relationship provides a secure base for the infants from which to explore the environment and a safe haven to return to in times of danger. attachment style shapes the behavior of individuals in adulthood. there are many different measures of attachment and a lot of controversy about what they measure and how they relate to each other. hence, we tried to evaluate...

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

Journal: :IEEE Transactions on Cloud Computing 2022

In the age of cloud computing, users with limited storage can outsource their data to remote servers. These servers, in lieu monetary benefits, offer retrievability clients' at any point time. Secure protocols enable a client check integrity outsourced data. this work, we explore possibility constructing secure for dynamic by leveraging algorithms involved network coding. We show that some codi...

Journal: :Journal of King Saud University - Computer and Information Sciences 2021

Colombia government wants to implement electronic voting. However, the existing voting protocols only include some of required security features and needs a protocol with all these ensure fraud-free elections. In this paper, we present design SIVP (Secure Internet Voting Protocol), new for electoral processes, based on blind signatures public key cryptography. This has six phases provides: elig...

Journal: :پژوهش های روانشناسی بالینی و مشاوره 0
سید علی کیمیایی حسن گرجیان مهلبانی

abstract the purpose of this research was to examine the relationship between secure-insecure attachment styles and cognitive distortions . to this end, 403 students from ferdowsi university of mashhad were selected using a random clustering procedure, and completed the collins and read (1990) attachment styles questionnaire and becham, leber, watkins, boyer, and cook’d (1986) cognitive triad i...

Journal: :تحقیقات علوم رفتاری 0
عباس بخشی پور رودسری احمد منصوری abbas bakhshipour rodsari ahmad mansouri

aim and background: insecure attachment style is one of the important effective factors in many mental disorders. the aim of this study was to compare the positive, negative and disorganized schizotypal characteristics in secure, avoidance and anxiety attachment patterns among students of tabriz university, iran. methods and materials: in this cross-sectional descriptive study 300 students (150...

Journal: :زن در توسعه و سیاست 0
سیدعلیرضا افشانی دکترای جامعه شناسی و استادیار دانشکده علوم اجتماعی دانشگاه یزد راضیه ذاکری هامانه کارشناسی ارشد جامعه شناسی دانشگاه یزد

feeling secure is a prerequisite of any social, economic, cultural and political development and it is directly related to the level of development of the society. being aware of the situation of security feelings of society members plays a key role in recognizing the challenges and development strategies of society and can strengthen the infrastructures of the society. the present study aims t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید