A Proxy Culture
نویسندگان
چکیده
منابع مشابه
In Defense of Cultural “Insanity”: Using Insanity as a Proxy for Culture in Criminal Cases
Courts in the United States do not recognize a formal “cultural defense” for criminal acts committed by defendants belonging to other cultures. This means that courts ostensibly do not take foreign cultural practices, customs, or beliefs into account in evaluating the guilt of individuals who break U.S. laws. Nonetheless, courts have repeatedly permitted cultural evidence to be introduced as an...
متن کاملSPARQL-Proxy: A Generic Proxy Server for SPARQL Endpoint
SPARQL-Proxy is a portable Web application that works as a proxy server of a SPARQL endpoint. It provides several functions such as job scheduling for SPARQL queries, validating the safety of query statements, and caching of SPARQL search results to improve response time performance.
متن کاملA Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
-Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong nonrepudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We...
متن کاملA Proxy E-Raffle Protocol Based on Proxy Signatures
In 2009, Chang and Cheng proposed an efficient proxy raffle protocol. In their scheme, the raffle tickets are known by participants as well as raffle organizers. Hence, unless we implicitly add the unrealistic assumption that the organizer is trustworthy, this may cause problems and threaten the security of the e-raffle from the viewpoint of participants. In this paper, we use the concept of pr...
متن کاملProxy Signatures Secure Against Proxy Key Exposure
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philosophy & Technology
سال: 2015
ISSN: 2210-5433,2210-5441
DOI: 10.1007/s13347-015-0209-8