نتایج جستجو برای: guarantees and parties responsibility
تعداد نتایج: 16836158 فیلتر نتایج به سال:
This paper contributes to the challenging field of security for wireless sensor networks by introducing a keyagreement scheme in which sensor nodes create secure radio connections with their neighbours depending on the aidof third parties. These third parties are responsible only for the pair-wise key establishment among sensor nodes,so they do not observe the physical phenomenon nor route data...
Civil remedies are procedures and sanctions, specified by civil statutes and regulations, used to prevent or reduce criminal problems and incivilities. Civil remedies generally aim to persuade or coerce nonoffending third parties to take responsibility and action to prevent or end criminal or nuisance behavior. Early examples of civil remedy approaches typically targeted non-offending third par...
Unemployment insurance (UI) provides temporary income support to workers who have lost their jobs and are seeking reemployment. This paper reviews the origins of the federal-state UI system in the United States and outlines its principles and goals. It also describes the conditions for benefit eligibility, the benefits themselves, and their financing through the UI payroll tax. The UI system is...
Software development processes are highly creative, and subject to frequent changes-making it hard to plan and schedule these processes in advance. Also, distributed projects cannot be planned centrally, especially if the involved parties are individual companies with their own areas of responsibility (as is the case in virtual Software corporations). On the other hand, certain aspects of the o...
Data interaction scenarios involving multiple parties in network communities have problems of trust, data security, and reliability the parties, secure multiparty computation(SMPC) can effectively solve these problems. To address security fairness issues SMPC, this study considers that semi-honest participants lead to deviations protocol, combines information entropy mutual present an n-round e...
Title of dissertation: BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS Ranjit Kumaresan, Doctor of Philosophy, 2012 Dissertation directed by: Professor Jonathan Katz Department of Computer Science Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party computation. These protocols are required to be resilient ...
this paper is about to discover the roots of formation of one of the political and social phenomena called political party in a particular period of iranian contemporary history. in the light of this kind of study we can go beyond the superficial and general analyses which are the characteristic of traditional and under developed societies unfortunately these analyses are used to justify all th...
In the past few years secure messaging has become mainstream, with over a billion active users of end-to-end encryption protocols through apps such as WhatsApp, Signal, Facebook Messenger, Google Allo, Wire and many more. While these users’ two-party communications now enjoy very strong security guarantees, it turns out that many of these apps provide, without notifying the users, a weaker prop...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید