نتایج جستجو برای: party action

تعداد نتایج: 642404  

2013
Marek Jawurek Florian Kerschbaum Claudio Orlandi

Zero-knowledge protocols are one of the fundamental concepts in modern cryptography and have countless applications. However, after more than 30 years from their introduction, there are only very few languages (essentially those with a group structure) for which we can construct zeroknowledge protocols that are efficient enough to be used in practice. In this paper we address the problem of how...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

abstract pragmatics is the study of communicative action in its sociocultural context. communicative action includes not only using speech acts (such as apologizing, complaining, complimenting, and requesting), but also engaging in different types of discourse and participating in speech events of varying length and complexity. the present study aimed to investigate the assessment of pragm...

2003
Felix Brandt

The fields of social choice theory and mechanism design deal with the aggregation of conflicting preferences in a group of agents, may they be electronic or human. Two central problems in these areas are the social choice problem and the mechanism design problem. We argue that the protection of individual preferences has not been considered so far and introduce the preference protection problem...

2003
Yehuda Lindell

Until recently, most research on the topic of secure computation focused on the stand-alonemodel, where a single protocol execution takes place. In this paper, we construct protocolsfor the setting of bounded-concurrent self composition, where a (single) secure protocol is runmany times concurrently, and there is a predetermined bound on the number of concurrentexecutions. In sh...

2011
Yan Huang Peter Chapman David Evans

Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the researc...

2009
Ryan Sheely

Why are some communities able to prevent actions that harm the viability of public goods, while others are not? Why might the same set of institutions operate in very different ways in two otherwise similar communities? In this paper, I outline a theory that shows how the extent to which third-party governance is embedded in local norms and networks can explain variation in the availability of ...

Soltanian Javadi, Saeed, Tohidfam, Mohammad,

Purpose: Ehsan Tabari (1295-1368) was the unmistakable theoretician of the Tudeh party for more than 42 years and was also arrested and imprisoned after the political developments of the 1960s and the arrest of the leaders of this party. Shortly after his arrest in a television program, he said he has turned to Islam by reconsidering his past thoughts. Methodology: This event transformed Tabari...

سید امین هادیان صدیقه علی جان زاده قرا علی اسماعیل زاده مقری,

در رسوایی­های مالی شرکت­ها، یکی از موضوعات مهم، مربوط به معاملات با اشخاص وابسته می­باشد. معاملات با اشخاص وابسته درشرکتها بسیار رایج می­باشد و ممکن است با اهداف خاصی انجام شود و موضوع مهم این است که منافع سهامداران اقلیت در مقایسه با منافع مدیرعامل یا سهامدار کنترل­کننده (اکثریت) در اولویت پایین­تری قرار می­گیرد. لذا این سهامداران از طریق معاملات با اشخاص وابسته با انحراف داراییها و انتقال قیم...

2005
Keith Frikken Keith B. Frikken Michael Goodrich Roberto Tamma Marina Blanton Sunil Prabhakar Rei Safavi-Naini Vinayak Deshpande

Frikken, Keith B. Ph.D., Purdue University, August, 2005. Secure and Private Online Collaboration. Major Professor: Mikhail J. Atallah. In this thesis, we investigate confidentialityand privacy-preserving protocols. Confidentialityand privacy-preserving protocols (also called secure protocols) allow two or more parties to compute some function of their private inputs without revealing to any gr...

Journal: :Leiden Journal of International Law 2021

Abstract The International Court of Justice recognized the legitimacy ‘non-party intervention’ under Article 62 Statute in its 1990 landmark decision on Nicaragua’s intervention Land, Island and Maritime Frontier Dispute (El Salvador v. Honduras) . Such form ‘is not intended to enable a third State tack new case, become party, so have own claims adjudicated by Court’. Its purpose is ‘protecting...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید