نتایج جستجو برای: practical identity
تعداد نتایج: 347233 فیلتر نتایج به سال:
We describe a practical e-voting protocol which guarantees e-voting protocol requirements: eligibility, privacy, accuracy, fairness, receipt-freeness, uncoercibility, robustness and verifiability. Unlike existing blind signature based protocols, in which the authority blindly signs ballot or part of ballot, the authority in our protocol blindly signs voter’s pseudo identity. Hereafter, voter be...
The current technological scenario determines a profileration of trust domains, which are usually defined by validating the digital identity linked to each user. This validation entails critical assumptions about the way users’ privacy is handled, and this calls for new methods to construct and treat digital identities. Considering cryptography, identity management has been constructed and mana...
Gender composition of VCs shapes the members’ communication style and content, and has a potential in influencing the anticipated benefits from VC participation. Extending prior research on VC participation and group composition, this study examines the moderating effect of gender composition in influencing the linkage between two important identity-based determinants, i.e., identification and ...
We newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryption and identity-based encryption schemes, our scheme allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the decryption key can decrypt every ciphertexts encrypted with tho...
Document security is an increasingly important element in the multi-faceted discipline of document processing, and authentication of individual identity will play an increasingly important future role in relation to questions of document ownership, identity and confidentiality. Biometrics-based techniques are emerging as key elements in the drive to address security and confidentiality in an ef...
This paper investigates the arguments used in public documents to mobilize Bulgarians against the deportation of Jews in World War II. We focus on the key documents relating to the first wave of mobilisation in 1940-1 as provided by Todorov (2001). We demonstrate that these documents are based on three types of argument. The first, category inclusion, treats the Jews as part of a common ingroup...
Domain-Specific Pseudonymous Signature schemes were recently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Security. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer’s true identity is hidden behind his domain ps...
Despite political support for the baccalaureate degree as entry to practice, historical concerns over nursing education - the value of education versus service, professional versus vocational identity and theoretical versus practical knowledge - persist. The authors challenge the notion of a "two-tiered" nursing system and call for a nationwide curriculum review to help the profession adapt to ...
We present an approach to generalization of practical Identity-Based Encryption scheme of [BF01]. In particular we show how the protocol could be used on finite modular lattices and as a special case on vector spaces over finite field. The original proof of security for this protocol does not hold in this general algebraic structure, thus this is still a work in progress.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید