نتایج جستجو برای: surrogacy contract revocation

تعداد نتایج: 46312  

Journal: :Security and Communication Networks 2010
Yong Wang Byrav Ramamurthy Xukai Zou Yuyan Xue

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categori...

Journal: :Biostatistics 2014
Anna S C Conlon Jeremy M G Taylor Michael R Elliott

In clinical trials, a surrogate outcome variable (S) can be measured before the outcome of interest (T) and may provide early information regarding the treatment (Z) effect on T. Using the principal surrogacy framework introduced by Frangakis and Rubin (2002. Principal stratification in causal inference. Biometrics 58, 21-29), we consider an approach that has a causal interpretation and develop...

2016
Susan Athey Raj Chetty Guido W. Imbens Hyunseung Kang

Estimating the long-term effects of treatments is of interest in many fields. A common challenge in estimating such treatment effects is that long-term outcomes are unobserved in the time frame needed to make policy decisions. One approach to overcome this missing data problem is to analyze treatments effects on an intermediate outcome, often called a statistical surrogate, if it satisfies the ...

Journal: :IACR Cryptology ePrint Archive 2016
Daniel Slamanig Raphael Spreitzer Thomas Unterluggauer

Group signatures represent an important mechanism for privacy-preserving applications. However, their practical applicability is restricted due to inefficiencies of existing membership revocation mechanisms that place a computational burden and communication overhead on signers and verifiers. In particular, it seems that the general belief (or unwritten law) of avoiding online authorities by al...

2006
John Solis Gene Tsudik

Digital certificates signed by trusted certification authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate needs to be revoked prematurely. For this reason, whenever a client (user or program) needs to assert...

2013
Rafik Chaabouni

In this paper we propose a solution to enable an accurate terminal revocation in the Extended Access Control (EAC). Chaabouni and Vaudenay in [CV09] pointed out the need for an accurate revocation procedure, but failed to provide a complete solution description. We aim at filling this gap. Our solution relies on augmenting terminal authentication with a t-out-of-` threshold signature provided b...

Journal: :Psychological science 2011
Jordan D Troisi Shira Gabriel

Theories of social surrogacy and embodied cognition assume that cognitive associations with nonhuman stimuli can be affectively charged. In the current research, we examined whether the "comfort" of comfort foods comes from affective associations with relationships. Two experiments support the hypotheses that comfort foods are associated with relationships and alleviate loneliness. Experiment 1...

Journal: :World Journal of English Language 2022

Infertility remains a threat to global health issues thus the remedy is with medical advancements in technology that enable infertile couples have babies through surrogacy. Surrogacy legal practice of hiring woman’s womb for bearing child parents where intended claim full parental rights and surrogate mothers get monetary compensation commercial gestational Surrogates are proletariats from thir...

Journal: :Human Reproduction Update 2003

2015
Megha R Jarang M V Nimbalkar

Mobile ad hoc networks (MANETs) have attracted more attention due to their mobility and simplicity of arrangement. However, the wireless and dynamic nature renders them more suspicious to various types of security attacks than the wired networks. To meet these challenges, certificate revocation is an important component for secure network communications. Certificate revocation is used to segreg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید