نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
Security of a key exchange protocol is formally established through an abstract game between a challenger and an adversary. In this game the adversary can get various information which are modeled by giving the adversary access to appropriate oracle queries. Empowered with all these information, the adversary will try to break the protocol. This is modeled by a test query which asks the adversa...
Background: Islam as a comprehensive religion rooted in human nature and revealed in order to respond to basic human needs has broadened the ethics of its criminal policy to include crime, crime and punishment. In keeping with each other and with the other rules of this religion, it has set guidelines and values based on ethics and principles for avoiding crime in the community if the Prophet...
The virtual tax village in line with the transformation of the tax process from self-declaration based method to electronic data based method and with the aim of compiling and developing the tax information bank and using technology, taxpayers in a virtual tax space. It collects the ID card holders and their financial data with the help of modern technologies and by benefiting from systematic m...
the ngos are one of the most important state actors. due to useful functions of these organizations, the state has established and codified some regulations regarding their activity. this study sought to explain the issue and their activities in two legal systems of iran and france. in iranian legal system, some regulations exist regarding their foundation and activity which is a bit strict in ...
We formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of quantitative information flow. Assuming that both defender and adversary may be active and influence the system during the attack, we define a general framework of information leakage games in which the payoff function of the game is information leakage. We provide methods f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید