نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

Journal: :IACR Cryptology ePrint Archive 2016
Suvradip Chakraborty Srinivasan Raghuraman C. Pandu Rangan

Security of a key exchange protocol is formally established through an abstract game between a challenger and an adversary. In this game the adversary can get various information which are modeled by giving the adversary access to appropriate oracle queries. Empowered with all these information, the adversary will try to break the protocol. This is modeled by a test query which asks the adversa...

Journal: :DEStech Transactions on Social Science, Education and Human Science 2019

,

Background: Islam as a comprehensive religion rooted in human nature and revealed in order to respond to basic human needs has broadened the ethics of its criminal policy to include crime, crime and punishment. In keeping with each other and with the other rules of this religion, it has set guidelines and values ​​based on ethics and principles for avoiding crime in the community if the Prophet...

The virtual tax village in line with the transformation of the tax process from self-declaration based method to electronic data based method and with the aim of compiling and developing the tax information bank and using technology, taxpayers in a virtual tax space. It collects the ID card holders and their financial data with the help of modern technologies and by benefiting from systematic m...

Journal: :مجله مطالعات حقوق تطبیقی 0
محمدحسین رمضانی قوام آبادی دانشیار گروه حقوق بین الملل دانشکدۀ حقوق دانشگاه شهید بهشتی

the ngos are one of the most important state actors. due to useful functions of these organizations, the state has established and codified some regulations regarding their activity. this study sought to explain the issue and their activities in two legal systems of iran and france. in iranian legal system, some regulations exist regarding their foundation and activity which is a bit strict in ...

2017
Mário S. Alvim Konstantinos Chatzikokolakis Yusuke Kawamoto Catuscia Palamidessi

We formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of quantitative information flow. Assuming that both defender and adversary may be active and influence the system during the attack, we define a general framework of information leakage games in which the payoff function of the game is information leakage. We provide methods f...

Journal: :Verfassung in Recht und Übersee 1983

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید