نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

2007
Xinyi Huang Yi Mu Willy Susilo Duncan S. Wong Wei Wu

In this paper we revisit the security models of certificateless signatures and propose two new constructions which are provably secure in the random oracle model. We divide the potential adversaries according to their attack power, and for the first time, three new kinds of adversaries are introduced into certificateless signatures. They are Normal Adversary, Strong Adversary and Super Adversar...

1999
Patrick Riley

Developing intelligent agents for multi-agent, inaccessible, adversarial environments is arguably one of the most challenging areas in artificial intelligence today. Great strides have been made in developing emergent cooperation among teammates, but less progress has been made in quickly and automatically changing overall team strategy in response to adversary actions. One way that humans do s...

H. Ghasemzadeh H. Mehrara M. Tajik Khasss

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

2000
Hajime Yoshino

It is an important task for a law professor to educate law students in the skill of legal reasoning. A legal expert system is a computer system,, which entails legal knowledge of lawyers as legal experts in its knowledge base. The legal knowledge involves not only written, explicit knowledge like conventions, statutes, cases, commentaries etc., but also implicit legal knowledge which a lawyer u...

Journal: تعلیم و تربیت 2020
A. Nouri, Ph.D., R. Ahmadifar, Ph.D.,

Having a clear set of basic Iranian students’ legal rights could serve as a practical guideline to commitments and responsibilities of teachers, administrators, and others dealing with education. To this end, all existing legal documents related to the topic were content analyzed. The result has been a set of fourteen principle areas which can be categorized into three subsets depending on the ...

Journal: :ACM Computing Surveys 2021

Mobile device authentication has been a highly active research topic for over 10 years, with vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user strong, systematic, increasingly formal threat models have established are used to qualitatively compare different methods. However, the analysis mobile is often based ...

Journal: :international journal of fertility and sterility 0
alireza milanifar zohreh behjati ardekani mohammad mehdi akhondi

embryo donation was one of the infertility treatment methods introduced to the iranian legal system in 2003 (act of embryo donation) and its by-law passed in 2005 after numerous discussions. embryo donation is a new legal issue in iran. no similar act has been previously legislated in the legal system; however, on the other hand, the importance of the judicial procedure in its execution cannot ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید