iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ encryption
جزئیات خدمات ترجمه در ترجمه تخصصی
cryptography
An Optimization of Security and Trust Management
1
Computer Network Security Protocols
1.6 / A MODEL FOR NETWORK SECURITY 19
1.6 / A MODEL FOR NETWORK SECURITY 19
G Model
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Das 25-ch14-361-388-9780124158153 2011/12/19 12:26 Page 361 #1
Optik 125 (2014) 6117–6122
PART2-15057
Optik 125 (2014) 6117–6122
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
ELmD v1.0
problem is that homomorphic encryption cannot be used for some
that doubles the performance of the previous generation engine for
Electronic Notes in Theoretical Computer Science 171 (2007) 57–69
A Av vailab ailable online at le online at www www.sciencedirect.com .sciencedirect.com
A. Encryption gateway node
Nonlinear Dyn (2012) 67:557–566
Iowa State University
PGP provides a confidentiality and authentication service that can be
PGP provides a confidentiality and authentication service that can be
Discovery ANALYSIS
Available online at www.sciencedirect.com
consumption of resources, to solve this problem, lightweight
A Robust Watermarking method based on
A Robust Watermarking method based on
A Robust Watermarking method based on
Chapter 1
A Speech Encryption Algorithm
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎–∎∎∎
On 802.11 Standard and the WiFi Network
On 802.11 Standard and the WiFi Network
On 802.11 Standard and the WiFi Network
Swiss privacy Tresorit handles data under Swiss privacy laws that
The Analysis of the Security Strategy of Embedded Mobile Database
Data Link Layer Security Protocols in Wireless
Data Link Layer Security Protocols in Wireless
On 802.11 Standard and the WiFi Network
Journal of Network and Computer Applications 35 (2012) 1831–1838
Design of a Trusted File System Based on Hadoop
2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies
A Survey on Security of Hadoop
Kerberos can be connected to corporate LDAPenvironments to centrally provision
Cloud computing has been flourishing in past years because of
it ensures the reliability and safety from the three levels
امنیت هادوپ
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
survey security of hadoop
Design of a Trusted File System Based on Hadoop
A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security
Cloud computing has been flourishing in past years because of
Journal of Network and Computer Applications 59 (2016) 198–207
Security in cloudcannot be simulated even though as different simulation
Study of PGP's Principium
Email Security and PGP Technical Analysis
Practical Implementation of a Secure Email
Practical Implementation of a Secure Email
2011 International Conference on Intelligence Science and Information Engineering
International Journal of Computer Applications (0975 – 8887)
Powered Wireless Sensor Networks Basic security of data transmission in
Understanding Cryptography Christof Paar · Jan Pelzl
Understanding Cryptography Christof Paar · Jan Pelzl
Chapter 1
CLOUD SECURITY
Project Code: WJM5110
Global Journal of Computer Science and Technology:
ALE: AES-Based Lightweight Authenticated
Accepted Manuscript
FutureGenerationComputerSystems ( ) –
FutureGenerationComputerSystems ( ) –
مA New Chaos-based Image Cipher Using a
CHAPTER
A Survey of Provably Secure Searchable Encryption
http://tarjomebazar.com
International Journal of Network Security, Vol.14, No.2, PP. 71-79, Mar. 2012 71
A Brief Introduction to Cryptography
International Journal of Software Engineering and Its Applications
Fully Homomorphic Encryption with Relatively Small Key and
Chapter 6
Chapter 6
Katz
4. System design
CRYPTOGRAPHY AND
Study of security issues and solutions in Internet of Things