نتایج جستجو برای: party action
تعداد نتایج: 642404 فیلتر نتایج به سال:
Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and have countless applications. However, after more than 30 years from their introduction, there are only very few languages (essentially those with a group structure) for which we can construct zeroknowledge protocols that are efficient enough to be used in practice. In this paper we address the problem of how...
abstract pragmatics is the study of communicative action in its sociocultural context. communicative action includes not only using speech acts (such as apologizing, complaining, complimenting, and requesting), but also engaging in different types of discourse and participating in speech events of varying length and complexity. the present study aimed to investigate the assessment of pragm...
The fields of social choice theory and mechanism design deal with the aggregation of conflicting preferences in a group of agents, may they be electronic or human. Two central problems in these areas are the social choice problem and the mechanism design problem. We argue that the protection of individual preferences has not been considered so far and introduce the preference protection problem...
Until recently, most research on the topic of secure computation focused on the stand-alonemodel, where a single protocol execution takes place. In this paper, we construct protocolsfor the setting of bounded-concurrent self composition, where a (single) secure protocol is runmany times concurrently, and there is a predetermined bound on the number of concurrentexecutions. In sh...
Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the researc...
Why are some communities able to prevent actions that harm the viability of public goods, while others are not? Why might the same set of institutions operate in very different ways in two otherwise similar communities? In this paper, I outline a theory that shows how the extent to which third-party governance is embedded in local norms and networks can explain variation in the availability of ...
Purpose: Ehsan Tabari (1295-1368) was the unmistakable theoretician of the Tudeh party for more than 42 years and was also arrested and imprisoned after the political developments of the 1960s and the arrest of the leaders of this party. Shortly after his arrest in a television program, he said he has turned to Islam by reconsidering his past thoughts. Methodology: This event transformed Tabari...
در رسواییهای مالی شرکتها، یکی از موضوعات مهم، مربوط به معاملات با اشخاص وابسته میباشد. معاملات با اشخاص وابسته درشرکتها بسیار رایج میباشد و ممکن است با اهداف خاصی انجام شود و موضوع مهم این است که منافع سهامداران اقلیت در مقایسه با منافع مدیرعامل یا سهامدار کنترلکننده (اکثریت) در اولویت پایینتری قرار میگیرد. لذا این سهامداران از طریق معاملات با اشخاص وابسته با انحراف داراییها و انتقال قیم...
Frikken, Keith B. Ph.D., Purdue University, August, 2005. Secure and Private Online Collaboration. Major Professor: Mikhail J. Atallah. In this thesis, we investigate confidentialityand privacy-preserving protocols. Confidentialityand privacy-preserving protocols (also called secure protocols) allow two or more parties to compute some function of their private inputs without revealing to any gr...
Abstract The International Court of Justice recognized the legitimacy ‘non-party intervention’ under Article 62 Statute in its 1990 landmark decision on Nicaragua’s intervention Land, Island and Maritime Frontier Dispute (El Salvador v. Honduras) . Such form ‘is not intended to enable a third State tack new case, become party, so have own claims adjudicated by Court’. Its purpose is ‘protecting...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید