نتایج جستجو برای: surrogacy contract revocation
تعداد نتایج: 46312 فیلتر نتایج به سال:
Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categori...
In clinical trials, a surrogate outcome variable (S) can be measured before the outcome of interest (T) and may provide early information regarding the treatment (Z) effect on T. Using the principal surrogacy framework introduced by Frangakis and Rubin (2002. Principal stratification in causal inference. Biometrics 58, 21-29), we consider an approach that has a causal interpretation and develop...
Estimating the long-term effects of treatments is of interest in many fields. A common challenge in estimating such treatment effects is that long-term outcomes are unobserved in the time frame needed to make policy decisions. One approach to overcome this missing data problem is to analyze treatments effects on an intermediate outcome, often called a statistical surrogate, if it satisfies the ...
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks
Group signatures represent an important mechanism for privacy-preserving applications. However, their practical applicability is restricted due to inefficiencies of existing membership revocation mechanisms that place a computational burden and communication overhead on signers and verifiers. In particular, it seems that the general belief (or unwritten law) of avoiding online authorities by al...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate needs to be revoked prematurely. For this reason, whenever a client (user or program) needs to assert...
In this paper we propose a solution to enable an accurate terminal revocation in the Extended Access Control (EAC). Chaabouni and Vaudenay in [CV09] pointed out the need for an accurate revocation procedure, but failed to provide a complete solution description. We aim at filling this gap. Our solution relies on augmenting terminal authentication with a t-out-of-` threshold signature provided b...
Theories of social surrogacy and embodied cognition assume that cognitive associations with nonhuman stimuli can be affectively charged. In the current research, we examined whether the "comfort" of comfort foods comes from affective associations with relationships. Two experiments support the hypotheses that comfort foods are associated with relationships and alleviate loneliness. Experiment 1...
Infertility remains a threat to global health issues thus the remedy is with medical advancements in technology that enable infertile couples have babies through surrogacy. Surrogacy legal practice of hiring woman’s womb for bearing child parents where intended claim full parental rights and surrogate mothers get monetary compensation commercial gestational Surrogates are proletariats from thir...
Mobile ad hoc networks (MANETs) have attracted more attention due to their mobility and simplicity of arrangement. However, the wireless and dynamic nature renders them more suspicious to various types of security attacks than the wired networks. To meet these challenges, certificate revocation is an important component for secure network communications. Certificate revocation is used to segreg...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید