نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

2006
Orhan Çetinkaya Ali Doğanaksoy

We describe a practical e-voting protocol which guarantees e-voting protocol requirements: eligibility, privacy, accuracy, fairness, receipt-freeness, uncoercibility, robustness and verifiability. Unlike existing blind signature based protocols, in which the authority blindly signs ballot or part of ballot, the authority in our protocol blindly signs voter’s pseudo identity. Hereafter, voter be...

2015
David Arroyo Jesus Diaz Francisco de Borja Rodríguez Ortiz

The current technological scenario determines a profileration of trust domains, which are usually defined by validating the digital identity linked to each user. This validation entails critical assumptions about the way users’ privacy is handled, and this calls for new methods to construct and treat digital identities. Considering cryptography, identity management has been constructed and mana...

2014
Kathy Ning Shen Mohamed Khalifa

Gender composition of VCs shapes the members’ communication style and content, and has a potential in influencing the anticipated benefits from VC participation. Extending prior research on VC participation and group composition, this study examines the moderating effect of gender composition in influencing the linkage between two important identity-based determinants, i.e., identification and ...

Journal: :IACR Cryptology ePrint Archive 2009
So-Young Park Sang-Ho Lee Joohan Lee

We newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryption and identity-based encryption schemes, our scheme allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the decryption key can decrypt every ciphertexts encrypted with tho...

2003
Michael C. Fairhurst

Document security is an increasingly important element in the multi-faceted discipline of document processing, and authentication of individual identity will play an increasingly important future role in relation to questions of document ownership, identity and confidentiality. Biometrics-based techniques are emerging as key elements in the drive to address security and confidentiality in an ef...

2005
Stephen Reicher Clare Cassidy Mark Levine Ian Kershaw

This paper investigates the arguments used in public documents to mobilize Bulgarians against the deportation of Jews in World War II. We focus on the key documents relating to the first wave of mobilisation in 1940-1 as provided by Todorov (2001). We demonstrate that these documents are based on three types of argument. The first, category inclusion, treats the Jews as part of a common ingroup...

Journal: :IACR Cryptology ePrint Archive 2016
Kamil Kluczniak

Domain-Specific Pseudonymous Signature schemes were recently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Security. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer’s true identity is hidden behind his domain ps...

Journal: :Nursing leadership 2014
Em M Pijl-Zieber Sonya Grypma Sylvia Barton

Despite political support for the baccalaureate degree as entry to practice, historical concerns over nursing education - the value of education versus service, professional versus vocational identity and theoretical versus practical knowledge - persist. The authors challenge the notion of a "two-tiered" nursing system and call for a nationwide curriculum review to help the profession adapt to ...

Journal: :CoRR 2012
Frantisek Polach

We present an approach to generalization of practical Identity-Based Encryption scheme of [BF01]. In particular we show how the protocol could be used on finite modular lattices and as a special case on vector spaces over finite field. The original proof of security for this protocol does not hold in this general algebraic structure, thus this is still a work in progress.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید