نتایج جستجو برای: secure

تعداد نتایج: 56843  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

همراه با رشد روز افزون استفاده از کارت های اعتباری در تراکنش های اینترنتی و در حالت کلی تر تجارت الکترونیکی، نیاز به معماری های امنیتی دقیق تر و سیستم های پرداخت امن تر بیشتر احساس می شود. راه حل های بسیاری برای مقابله با دو مشکل عمده تراکنش های اینترنتی، phishing و حملات مرتبط با اطلاعات محرمانه ذخیره شده کارت های اعتباری، ارائه شده اند. استاندارد امنیت اطلاعات در صنعت کارت های پرداخت راه کاره...

Journal: :Journal of Computing Science and Engineering 2011

Journal: :international journal of applied behavioral sciences 0
minoo pooravari ma in counseling, department of educational science&psychology, university of shahid beheshti saeed ghanbari assistant professor, department of educational science&psychology, university of shahid beheshti ali zadeh mohammadi associate professor, family research insititute, university of shahid beheshti leili panaghi associate professor, family research insititute, university of shahid beheshti elham aghdasta ma in counseling, department of educational science&psychology, university ofallameh tabataba'ei

the purpose of present research was comparing tendency to risky behaviours in secure/insecure attachment in parents (mother/father). the results showed that those showing insecure attachment patterns towards the mother were significantly higher at risk to become cigarette smokers, drug persuasion, and alcohol drinkers compared to those with secure attachment patterns. those showing insecure att...

A. Bagheri, GH. Abed Hodtani

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

Journal: :Intercultural Communication 2018

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

ژورنال: پژوهش های ریاضی 2022

Let  be a simple graph with vertex set  and edges set . A set  is a dominating set if every vertex in  is adjacent to at least one vertex  in . An eternal 1-secure set of a graph G is defined as a dominating set  such that for any positive integer k and any sequence  of vertices, there exists a sequence of guards   with  and either  or  and  is a dominating set. If we take a guard on every ver...

Journal: :International Journal of Computer Applications 2015

ژورنال: پژوهش های مشاوره 2018

Purpose: This study was done to predict sexual communication based on attachment style and differentiation of self in married female students of Universities in city of Ahvaz. The 220 participants were selected through accessible sampling. Methods: The participants completed Wheeless & Baus Sexual Communication Scale (1984), Simpson Adult Attachment Scale Questionnaire (2003), and Differentiati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید