A Proxy Culture

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In Defense of Cultural “Insanity”: Using Insanity as a Proxy for Culture in Criminal Cases

Courts in the United States do not recognize a formal “cultural defense” for criminal acts committed by defendants belonging to other cultures. This means that courts ostensibly do not take foreign cultural practices, customs, or beliefs into account in evaluating the guilt of individuals who break U.S. laws. Nonetheless, courts have repeatedly permitted cultural evidence to be introduced as an...

متن کامل

SPARQL-Proxy: A Generic Proxy Server for SPARQL Endpoint

SPARQL-Proxy is a portable Web application that works as a proxy server of a SPARQL endpoint. It provides several functions such as job scheduling for SPARQL queries, validating the safety of query statements, and caching of SPARQL search results to improve response time performance.

متن کامل

A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection

-Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong nonrepudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We...

متن کامل

A Proxy E-Raffle Protocol Based on Proxy Signatures

In 2009, Chang and Cheng proposed an efficient proxy raffle protocol. In their scheme, the raffle tickets are known by participants as well as raffle organizers. Hence, unless we implicitly add the unrealistic assumption that the organizer is trustworthy, this may cause problems and threaten the security of the e-raffle from the viewpoint of participants. In this paper, we use the concept of pr...

متن کامل

Proxy Signatures Secure Against Proxy Key Exposure

We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure in our enhanced model using sequential agg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Philosophy & Technology

سال: 2015

ISSN: 2210-5433,2210-5441

DOI: 10.1007/s13347-015-0209-8