نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversar...
Developing intelligent agents for multi-agent, inaccessible, adversarial environments is arguably one of the most challenging areas in artificial intelligence today. Great strides have been made in developing emergent cooperation among teammates, but less progress has been made in quickly and automatically changing overall team strategy in response to adversary actions. One way that humans do s...
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
It is an important task for a law professor to educate law students in the skill of legal reasoning. A legal expert system is a computer system,, which entails legal knowledge of lawyers as legal experts in its knowledge base. The legal knowledge involves not only written, explicit knowledge like conventions, statutes, cases, commentaries etc., but also implicit legal knowledge which a lawyer u...
Having a clear set of basic Iranian students’ legal rights could serve as a practical guideline to commitments and responsibilities of teachers, administrators, and others dealing with education. To this end, all existing legal documents related to the topic were content analyzed. The result has been a set of fourteen principle areas which can be categorized into three subsets depending on the ...
Mobile device authentication has been a highly active research topic for over 10 years, with vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user strong, systematic, increasingly formal threat models have established are used to qualitatively compare different methods. However, the analysis mobile is often based ...
embryo donation was one of the infertility treatment methods introduced to the iranian legal system in 2003 (act of embryo donation) and its by-law passed in 2005 after numerous discussions. embryo donation is a new legal issue in iran. no similar act has been previously legislated in the legal system; however, on the other hand, the importance of the judicial procedure in its execution cannot ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید