نتایج جستجو برای: verifiability

تعداد نتایج: 874  

Journal: :Synthese 2017
Sebastian Lutz

Carnap’s search for a criterion of empirical significance is usually considered a failure. I argue that the results from two out of his three different approaches are at the very least problematic, but that one approach led to success. Carnap’s criterion of translatability into logical syntax is too vague to allow for definite results. His criteria for terms—introducibility by chains of reducti...

Journal: :J. Internet Serv. Inf. Secur. 2012
Jianfeng Wang Xiaofeng Chen Hua Ma Qiang Tang Jin Li Hui Zhu

As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently, some searchable encryption schemes have been proposed in the literatures. Although the existin...

2013
V. Abinaya V. Ramesh

Attribute-based encryption (ABE) is a standard encryption that allows users to encrypt and decrypt data based on user attributes. I t is extension o f attribute set based encryption to improve scalability and flexibility w hile at the same time Inherits the feature of fine grained access control of ABE.It is flexible access control of encrypted data stored in the cloud. It is using access polic...

2009
Peter Y. A. Ryan Vanessa Teague

Code voting seeks to address the issues of privacy and integrity for Remote Internet Voting. It sidesteps many of the inherent vulnerabilities of the Internet and client platforms but it does not provide end-to-end verification that votes are counted as cast. In this paper, we propose a simple technique to enhance the verifiability of code voting by ensuring that the Vote Server can only access...

2010
CHIEN-YUAN LAI DONG-HER SHIH CHING-CHIANG CHEN

Unified Modeling Language (UML) is the Object Management Group (OMG) standard notation for object-oriented modeling. UML activity diagram (AD) are widely used to workflow and system flow in system analysis. However, activity diagram lacks support for simulation, dynamic semantics limits and verifiability capabilities. APN are a popular technique for modeling the control flow dimension of workfl...

2010
Allan Berrocal Rojas Elena Gabriela Barrantes S.

Most embedded systems for the avionics industry are considered safety critical systems; as a result, strict software development standards exist to ensure critical software is built with the highest quality possible. One of such standards, DO-178B, establishes a number of properties that software requirements must satisfy including: accuracy, non-ambiguity and verifiability. From a language per...

2011
Denise Demirel Maria Henning Peter Y. A. Ryan Steve A. Schneider Melanie Volkamer

Prêt à Voter is one of the most well-known and most extensively analysed electronic voting systems for polling stations. However, an analysis from a legal point of view has not yet been conducted. The purpose of this paper is to analyse the readiness of Prêt à Voter for legally binding federal elections in Germany. This case is of particular interest as Germany has with the Constitutional Court...

2015
Junzuo Lai Robert H. Deng Chaowen Guan A. B. Lewko T. Okamoto A. Sahai K. Takashima

Inside a dispersed foriegn atmosphere, anyone receives a untrusted company which has a change for better crucial allowing this foriegn to turn any kind of ABE ciphertext fulfilled through the wearer's features. Stability of ABE technique with outsourced decryption makes certain that a foe (including any destructive cloud) aren't going to be capable to study everything about the encrypted meanin...

2015
Aggelos Kiayias Thomas Zacharias Bingsheng Zhang

We present the cryptographic implementation of “DEMOS”, a new e-voting system that is endto-end verifiable in the standard model, i.e., without any additional “setup” assumption or access to a random oracle (RO). Previously known end-to-end verifiable e-voting systems required such additional assumptions (specifically, either the existence of a “randomness beacon” or were only shown secure in t...

Journal: :I. J. Network Security 2016
Qiao Peng Youliang Tian

Using multiple linear of multilinear map, we propose a simple, non-interactive and effective publicly verifiable secret sharing (PVSS) scheme based on multilinear DiffieHellman assumption (MDH). Up to now, the publicly verifiable of secret sharing is still an issue. In this paper, we set the sharing secret is a multiple linear pairing, we apply the multiple linear property of multilinear map fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید