نتایج جستجو برای: e identity
تعداد نتایج: 1127292 فیلتر نتایج به سال:
Purpose – Modern e-health systems incorporate different healthcare providers in one system and provide an electronic platform to share medical information efficiently. In cross-context communications between healthcare providers, the same information can be interpreted as different types or values, so that one patient will be issued different identifiers by different healthcare providers. This ...
Fraud and identity theft have been increasing with the use of e-commerce. In the U.S. alone, it has been estimated that victims may spend on average $1,500 in out-of-pocket expenses and an average of 175 hours in order to resolve the many problems caused by such identity thieves. Organizations that engage in e-commerce as a large part of their business need to protect their customers against th...
A: is paper establishes that the occasional identity relation and the contingent identity relation are both non-transitive and as such are not properly classified as identity relations. is will be achieved by appealing to cases where multiple fissions and fusions occur simultaneously. ese cases show that the contingent and occasional identity relations do not even satisfy the time-ind...
Let G be a group with identity e. Let R be a G-graded commutative ring and let M be a graded R-module. The graded classical prime spectrum Cl.Specg(M) is defined to be the set of all graded classical prime submodule of M. The Zariski topology on Cl.Specg(M); denoted by ϱg. In this paper we establish necessary and sufficient conditions for Cl.Specg(M) with the Zariski topology to be a Noetherian...
E-collaboration is much more than the technological equivalent or substitute for traditional face-toface collaboration. The new metrics of time and distance modify, in essence, human interactions and, indeed, turn the classic network of face-to-face relationships into a network of e-relationships between individuals. The network, in turn, influences the development of a virtual team and its pro...
In this paper, we propose a new Identity-based signcryption (IBSC) scheme in the standard model. Our scheme shows an improvement of approximately 40% reduction in the ciphertext size when compared to the previously proposed IBSC schemes in the standard model. Further, we argue that the previous IBSC schemes do not provide su cient simulation ability in the security game. We show that with some ...
Diversity-enhancing policies are practiced around the world. This paper explores the economics of such policies. A model is proposed where heterogeneous agents, distinguished by skill level and social identity, purchase productive opportunities (or slots) in a competitive market. The problem of designing an e cient policy to raise the status of a disadvantaged identity group in this competition...
An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems—authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key issues to be addressed in the...
The lack of privacy is one of the main reasons that limits trust in e-commerce. Current e-commerce practice enforces a customer to disclose her identity to the e-shop and the use of credit cards makes it straightforward for an e-shop to know the real identity of its customers. Although there are some payment systems based on untraceable tokens, they are not as widely used as credit cards. Furth...
We formulate the WT identity for proper vertices in a simple and compact form ∂Γ ∂θ = 0 in a superspace formulation of gauge theories proposed earlier. We show this WT identity ( together with a subsidiary constraint) lead, in transparent way, the superfield superspace multiplet renormalizations formulated earlier ( and shown to explain symmetries of Yang-Mills theory renormalization ). ∗e-mail...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید