نتایج جستجو برای: e identity
تعداد نتایج: 1127292 فیلتر نتایج به سال:
We present a novel approach to e-voting for elections, based on a new cryptographic construction, double-blind identity based encryption (IBE). In standard IBE, the identity string that is passed to a key generation centre (KGC) during the key extraction phase is visible to the KGC. Recent work introduced the notion of blinding the identity string, resulting in a private key generation protocol...
Light plays an important role in the valuation of architectural elements, and it is a factor in designing spaces. Elements have no visual identity without light. This paper is intended to analyze the lighting in the vault of Shahrak-e-Gharb Jame Mosque with an emphasis on the role of daylight in order to find out how the designer has viewed the use of daylight in designing this mosque. The main...
Password is the most commonly used authentication technique in smart card based authentication protocols. During communication, the static identity based authentication protocols leaks out the user’s authentication messages corresponding to static identity to the attacker. Therefore, the attacker can trace and identify the different requests belonging to the same user. On the other hand, the dy...
We introduce the concept of escrowed identity, an application of key-escrow ideas to the problem of authentication. In escrowed identity , one party A does not give his identity to another party B, but rather gives him information that would allow an authorized third party E to determine A's identity. However, B receives a guarantee that E can indeed determine A's identity. We consider a number...
Abstract We consider an identity relating Fibonacci numbers to Pascal’s triangle discovered by G. E. Andrews. Several authors provided proofs of this identity, all of them rather involved or else relying on sophisticated number theoretical arguments. We not only give a simple and elementary proof, but also show the identity generalizes to arrays other than Pascal’s triangle. As an application w...
a r t i c l e i n f o Although the influence of identity on consumer behavior has been documented in many streams of literature, the absence of a consistent definition of identity and of generally accepted principles regarding the drivers of identity-based behavior complicates comparisons across these literatures. To resolve that problem, we propose a simple but inclusive definition of identity...
The growth of online transactions coincides with the rise of cyber-criminals’ intent on stealing consumers’ personal and financial data. This fosters fear of online identity theft (FOIT), which in turn may lead to changes in consumer behavior and negatively affect e-business performance. This research aims to identify empirically derived segments of FOIT-prone consumers. Using a large sample of...
Democracies have two basic choices for managing ethnic, national, and religious diversity. They may seek to construct a single all-embracing public identity through “ integration ” or try to accommodate dual or multiple public identities through “ consociation. ” These are the two dominant, broad-based prescriptions that are offered for addressing the confl ict in Iraq. In this article, we argu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید