نتایج جستجو برای: verifiability
تعداد نتایج: 874 فیلتر نتایج به سال:
Recently, Baek et al. proposed a stateful identity based encryption scheme with compact ciphertext and commented that the security of the scheme can be reduced to the Computational Bilinear Diffie Hellman (CBDH) problem. In this paper, we formally prove that the security of the stateful identity based encryption scheme by Baek et al. cannot be reduced to the CBDH problem. In fact, we show that ...
Purpose: The financial reporting quality for enterprises in general and commercial banks Vietnam particular plays a very important role because it is used by many stakeholders (internal external) to make relevant decisions. In this study, the author assessed current status of Vietnamese through qualitative characteristics statements. Theoretical framework: statements according IASB 2018 includi...
We employ the new primitive of non-interactive zero-sharing to realize efficiently and privately various “distributed decision making” procedures. Our methodology emphasizes non-interactiveness and universal verifiability. Non-interactiveness suggests that there is no need for bilateral communication between the active participants; instead decision making is achieved by unilateral communicatio...
How should open agent societies be organized? Should they be democracies, and, if so, what types of democracy? We present three normative models of democracy from political philosophy and consider their relevance for the engineering of open multi-agent systems: democracy as wise rule by an elite; democracy as the exercise of rational consumer choices by voters; and democracy as deliberative dec...
Voter privacy and verifiability are fundamental security concepts for electronic voting. Existing literature on electronic voting provides many definitions and interpretations of these concepts, both informal and formal. While the informal definitions are often vague and imprecise, the formal definitions tend to be very complex and restricted in their scope as they are usually tailored for spec...
The intelligence community (IC) gathers and analyzes a large amount of information from a variety of sources to produce intelligence products for decision makers and policy makers. It is imperative that these intelligence products are of highest quality. From raw inputs to final intelligence products, there are often many processes involved. In addition to the quality of final intelligence prod...
Product Recommendations Agents (PRAs) are software applications that augment consumers’ purchasing decisions by offering product recommendations based on consumers’ preferences that are elicited either explicitly or implicitly. The underlying premise of PRAs is often grounded on the assumption that PRAs seek to optimize consumers’ utility with the recommendations provided. However, since a majo...
We consider group formation with asymmetric information. Agents have unverifiable characteristics as well as the verifiable qualifications required for memberships in groups. The characteristics can be chosen, such as strategies in games, or can be learned, such as skills required for jobs. They can also be innate, such as intelligence. We assume that the unverifiable characteristics are observ...
We investigate the topic of reincarnation by revisiting a recent debate from the pages of the journal Philosophy East and West between Whitley Kaufman, who presents five moral objections to karma and reincarnation as an explanation for human suffering, and Monima Chadha and Nick Trakakis, who seek to respond to Kaufman’s critiques. Our discussion of four of the problems analysed in their exchan...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید