نتایج جستجو برای: security analysis

تعداد نتایج: 2963315  

Zahra Ghanbari

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

اسماعیلی, فاطمه, بارونی, محسن, مهرالحسنی, محمد حسین, گودرزی, رضا,

Background and Objectives: Productivity and efficiency are the most important and the most common mechanisms of evaluation and measurement of the performance of an enterprise including the Social Security Organization. In the past decades, performance evaluation of various economic sectors has been attractive to researchers in different disciplines. Thus, the aim of this study was to measure th...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2021

ژورنال: پژوهش های مشاوره 2019

Purpose: This study aimed to determine the relationship between job security and organizational justice with job burnout in Emdad committee staff. Method: This study was  of descriptive-correlational type, with research population including  all of the staff at Emdad committee in Tehran in the year 2015-2016, that corresponded to  14,000 people. Random cluster  sampling was used, and the 220 pa...

Journal: :پژوهش و برنامه ریزی روستایی 0
مسلم سواری حسین شعبانعلی فمی ژیلا دانشور عامری

purpose: considering the important role of rural women in food security, the main purpose of this study is to study the rural women's empowerment in improving household food security. method: the research data was collected through questionnaires filled out by rural married women in divandareh county. based on random sampling, 213 of them were selected. the validity of questionnaire was confirm...

2010
Charles Bouillaguet Pierre-Alain Fouque Gaëtan Leurent

In this paper we study the security of the SHA-3 candidate SIMD. We first show a new free-start distinguisher based on symmetry relations. It allows to distinguish the compression function of SIMD from a random function with a single evaluation. However, we also show that this property is very hard to exploit to mount any attack on the hash function because of the mode of operation of the compr...

Journal: :CoRR 2013
Mohammed Ennahbaoui Said El Hajji

Security has become, nowadays, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solution is to improve tools and mechanisms to strengthen the protection of applications against attacks and ensure the different security objectives. Among solutions we will talking about, in this paper...

, ,

The objective study was to investigate the effects of social capital on sustainability security in the villages the border areas. Statistical population including the villages of the central city of Saravan are heads of households (N= 9946). 421 households (23 villages) using Cochran formula and simple random sampling were selected. for the analysis data, descriptive and inferential statistics ...

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید