نتایج جستجو برای: guarantees and parties responsibility

تعداد نتایج: 16836158  

پایان نامه :دانشگاه آزاد اسلامی واحد گرمی - دانشکده حقوق 1393

چکیده دریافت کنندگان تسهیلات بانکی، به دلیل وثایقی که بانک از آنها اخذ کرده است اقدام به بازپرداخت اقساط تسهیلات می کنند و اگر بدانند که بانک ها قادر به اجرای وثایق نخواهند بود، تمایلی به ایفای تعهدات خود نخواهند داشت. این امر خصوصاً در شرایط تورمی موجب افزایش مطالبات معوق بانک ها خواهد شد و در نهایت، توان وام بانک ها و دسترسی به اعتبار برای بنگاه های اقتصادی را با دشواری مواجه می سازد. فقدان م...

Journal: :IACR Cryptology ePrint Archive 2012
Martin Hirt Christoph Lucas Ueli Maurer Dominik Raub

The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. For this purpose, a fixed set of n parties runs a protocol that tolerates an adversary corrupting a subset of the parties, preserving certain security guarantees like correctness, secrecy, robustness, and fairness. Corruptions can be either passive or active: A pas...

2010
Peter Lofgren Nicholas Hopper

Anonymous blacklisting schemes allow online service providers to prevent future anonymous access by abusive users while preserving the privacy of all anonymous users (both abusive and non-abusive). The first scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on trusted third parties who can collude to de-anonymiz...

2012
Dima Alhadidi Noman Mohammed Benjamin C. M. Fung Mourad Debbabi

Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, -differential privacy provides one of the strongest privacy guarantees. In this paper, we address the problem of private data publishing where data is horizontally divided among two parties over the same set of attributes. In particular, we...

Journal: :IACR Cryptology ePrint Archive 2017
Ludo Tolhuizen Ronald Rietman Óscar García-Morchón

In [1], Peikert proposed efficient and practical lattice-based protocols for key transport, encryption and authenticated key exchange. One of the main technical innovations of [1] is a reconciliation technique that allows two parties who ”approximately agree” on a secret value to reach exact agreement, a setting common to essentially all lattice-based encryption schemes. In [1], this reconcilia...

2004
Jens Groth

Most voting schemes rely on a number of authorities. If too many of these authorities are dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy Kiayias and Yung [1] introduced the concept of elections with perfect ballot secrecy. In this type of election scheme it is guaranteed that the only thing revealed about voters’ choices is the result of the election,...

2003
Regine Endsuleit Thilo Mie

We propose a security model for open multi-agent systems. Given a user-defined task T , we generate a group of mobile agents which realise a common functionality that solves T . Those agents cooperate with each other and build an autonomous community. Using a scheme for secure distributed computations, this community is able to perform secure computations without requiring interaction with a tr...

2015
Mahnush Movahedi Jared Saia Mahdi Zamani

In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random permutation of their inputs while keeping the permutation secret. This problem is important as a primitive in many privacy-preserving applications such as anonymous communication, location-based services, and electronic voting. Known techniques for solving this problem suffer from poor scalabilit...

2012
Arun Rajkumar Shivani Agarwal

We consider the problem of developing privacypreserving machine learning algorithms in a distributed multiparty setting. Here different parties own different parts of a data set, and the goal is to learn a classifier from the entire data set without any party revealing any information about the individual data points it owns. Pathak et al [7] recently proposed a solution to this problem in whic...

2007
Marc van Lieshout Linda Kool

European citizens consider Radio Frequency Identification (RFID) to be the most intrusive technology of the past two decades. Safeguarding privacy requires specific action that needs attention of all parties involved. European citizens consider legal instruments to offer insufficient guarantees for safeguarding privacy. `Privacy by design ́ offers interesting opportunities to build in privacy gu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید