iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ authentication
جزئیات خدمات ترجمه در ترجمه تخصصی
CWE- 7 9 8: Use of Hard-coded Credentials
Computer Network Security Protocols
A Context-Aware Security Architecture for Emerging Applications
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Section Three
the online payment company is no longer allowing users to
processes and personnel for collecting, processing,
Efficient and Fault-Diagnosable Authentication
1.4 / SECURITY SERVICES 15
18
1.4 / SECURITY SERVICES 15
18
International Journal of Computer Applications (0975 – 8887)
An Illustrated Guide to IPsec IPsec is a suite of
One of the two core security protocols in IPSec is
Authentication
I. J. Computer Network and Information Security, 2013, 10, 44-50
Computer Networks 73 (2014) 185–194
I. J. Computer Network and Information Security, 2013, 10, 44-50
Wireless PersCommun(2014)78:247–269
security and privacy protection is an important issue that needs
based on the hardness of the Learning Parity with Noise
Secure RFID Authentication Protocol with Key
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Available online at www.sciencedirect.com
control limit ipv6 49 Chapter 3 Commands for the Number
Journal of Network and Computer Applications 35 (2012) 763–769
dirham teams are working on activating the service in 5
Abstract This paper provides an overview of RADIUS deployment in
Abstract This paper provides an overview of RADIUS deployment in
2013 Ninth International Conference on Computational Intelligence and Security
2013 Ninth International Conference on Computational Intelligence and Security
ASurveyontheInternetofThingsSecurity
IoT Framework Security Considerations
On 802.11 Standard and the WiFi Network
On 802.11 Standard and the WiFi Network
On 802.11 Standard and the WiFi Network
The Analysis of the Security Strategy of Embedded Mobile Database
On 802.11 Standard and the WiFi Network
A Survey on Security of Hadoop
Kerberos can be connected to corporate LDAPenvironments to centrally provision
امنیت هادوپ
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
Kerberos can be connected to corporate LDAPenvironments to centrally provision
survey security of hadoop
Authentication Service in Hadoop using One Time Pad
3 Challenges in Designing Security Mechanism for Hadoop Hadoop uses
22 | Operator's manual
22 | Operator's manual
CCNA Security 640-554
Security in cloudcannot be simulated even though as different simulation
�
MESSAGE PROCESSING AND THE
Users need automated tools to help manage such configurations that
Users need automated tools to help manage such configurations that
Users need automated tools to help manage such configurations that
Security Comes to SNMP: The New
SECURITY ON TAP
SECURITY ON TAP
ISSN (Print) : 2320 – 3765
1 WSSO System
1 WSSO System
www.comsoc.org/pubs/ surveys
tcpcrypt
tcpcrypt
http://www.bankinfosecurity.com/
http://www.bankinfosecurity.com/
When ABN AMRO was looking for a way to increase accessibility of its customer
the initial introduction found that 83% preferred voice verification over the 5 digit
HSBC launches biometric security for mobile banking in the UK
More than one-third of UK consumers use the same password across most of their online accounts and more than half rarely
رمزنگاری شبکه کامپیوتر
SECURITY ON TAP
CHAPTER V- EVALUATION OF DECISION MODELS
87733 (2) - AMQP Cleartext Authentication
International Journal of Science and Research (IJSR)
CHAPTER 2
CHAPTER 2
CHAPTER 2
CHAPTER 2
1
CHAPTER 2
CHAPTER 2
CHAPTER 2
Shancang Li is a Senior Lecturer in Department of Computer
Information Sciences xxx (2013) xxx–xxx
Information Sciences xxx (2013) xxx–xxx
J Supercomput
a b s t r a c t Social processes
Downloaded from http://iranpaper.ir
IoTSecurity: Review,BlockchainSolutions,andOpenChallenges
DHILLON AND KALRA 7of20
DHILLON AND KALRA 9of20
DHILLON AND KALRA 9of20
DHILLON AND KALRA 17 of 20
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
Computer Networks 79 (2015) 68–90
Journal of Medical Systems (2018) 42:186
5004
5004-1
به منظور افزایش امنیت در دسترسی به سوئیچ ها با
Accepted Manuscript
applied
Appl. Sci. 2017, 7, 1069 5of22
applied
Appl. Sci. 2017, 7, 1069 5of22
you ensure that connection attempts provide two or more pieces