نتایج جستجو برای: third party

تعداد نتایج: 267981  

Journal: :The Mississippi Valley Historical Review 1933

2011
Zulfa Shaikh Poonam Garg

In this paper, comparative study of different available Secure Multiparty Computation (SMC) protocols have been addressed. In SMC, a set of parties wishes to jointly compute some function on their inputs. This computation must preserve certain security properties, like privacy and correctness. The general approach for such kind of computation is to make use of trusted third party to do the comp...

Journal: :CoRR 2011
Emmanuel Abbe Amir E. Khandani Andrew W. Lo

Unlike other industries in which intellectual property is patentable, the financial industry relies on trade secrecy to protect its business processes and methods, which can obscure critical financial risk exposures from regulators and the public. We develop methods for sharing and aggregating such risk exposures that protect the privacy of all parties involved and without the need for a truste...

2005
Heiko Stamer

There are many wonderful protocols in cryptography which are still waiting for their realization. Here we consider efficient solutions for secure electronic card games. Our contribution seems to be the first known practical implementation that requires no trusted third-party and simultaneously keeps the players’ strategies confidential. The provided open source library LibTMCG can be used for c...

2009
Magdalena Payeras-Capellà Macià Mut Puigserver Andreu Pere Isern-Deyà Josep Lluís Ferrer-Gomila Llorenç Huguet i Rotger

An electronic contract signing protocol is a fair exchange protocol where the parties exchange their signature on a contract. Some contract signing protocols have been presented, and usually they come with an informal analysis. In this paper we use Colored Petri Nets to formally verify the fairness and the resistance to five previously described attacks of FPH contract signing protocol. We have...

Journal: :CoRR 2014
Samiksha Shukla G. Sadashivappa Durgesh Kumar Mishra

secure multi-party computation is widely studied area in computer science. It is touching all most every aspect of human life. This paper demonstrates theoretical and experimental results of one of the secure multi-party computation protocols proposed by Shukla et al. implemented using visual C++. Data outflow probability is computed by changing parameters. At the end, time and space complexity...

2006
Jianying Zhou Jose Antonio Onieva Javier López

Contract signing is a fundamental service in doing business. The Internet has facilitated the electronic commerce, and it is necessary to find appropriate mechanisms for contract signing in the digital world. A number of two-party contract signing protocols have been proposed with various features. Nevertheless, in some applications, a contract may need to be signed by multiple parties. Less re...

Journal: :مدیریت زنجیره تأمین 0
عبدالستار صفائی احمد محمدپور لاریمی قاسم افضلی حاجی دلا

organizations around the world are seeking for tactics and techniques in order to survive in today's turbulent competitive environment. one of these approaches is outsourcing logistics supply chain operations in terms of third-party logistics companies. the results of the researches in supply chain, confirms the importance of third party logistic companies and the synergy of these companies for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید