نتایج جستجو برای: coin

تعداد نتایج: 5819  

Journal: :Parameters 2021

Counterinsurgency does not increase the legitimacy of, or support for, central governments engaged in internal conflicts. Recent research shows quantifiable degrees of government legitimacy, national identity, and population security are necessary precursors accurate predictors a government’s ability to outlast civil uprising. Because first two predictors—government identity—can be measured do ...

Journal: :International Journal of Information Security 2022

Abstract In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flipping coins is indispensable in this manner, themselves never been spotlight. Therefore, we would like make physical rise level just as a deck playing cards has used perform secure multi-party computation. Such card-based protocol known be helpful both com...

2011
Gautam B. Singh Anil k Rai Hukum Singh Anubha Varun

Impaction of foreign body in larynx is reported exclusively in paediatric population only. Moreover impaction of coin in larynx has never been reported previously. With this background, we report a rare case of coin impaction in larynx in a healthy adult.

2004
Alex D. Gottlieb

This note introduces some examples of quantum random walks in R and proves the weak convergence of their rescaled n-step densities. One of the examples is called the Plancherel quantum walk because the “quantum coin flip” is the Fourier Integral (or Plancherel) Transform. The other examples are the Birkhoff quantum walks, so named because the coin flips are effected by means of measure preservi...

2013
Ran Canetti Huijia Lin Omer Paneth

Public-coin zero-knowledge and concurrent zero-knowledge (cZK) are two classes of zero knowledge protocols that guarantee some additional desirable properties. Still, to this date no protocol is known that is both public-coin and cZK for a language outside BPP. Furthermore, it is known that no such protocol can be black-box ZK [Pass et.al,

Journal: :Proceedings of the International Conference on Business Excellence 2018

2008
Feifang HU Li-Xin ZHANG Siu H. CHEUNG Wai S. CHAN

In clinical studies, patients are usually accrued sequentially, and, in such cases, response-adaptive designs are useful tools to generate treatment allocation schemes in which the assignment of a treatment to an incoming patient is a function of the observed treatment responses thus far. It has been shown that among the various classes of designs, doubly adaptive biased coin designs have sever...

2008
Alex D. Gottlieb

This note introduces a quantum random walk in R and proves the weak convergence of its rescaled n-step densities. Quantum walks of the type we consider in this note were introduced in [1], which defined and analyzed the Hadamard quantum walk on Z, and a “new type of convergence theorem” for such quantum walks on Z was discovered by Konno [4, 5]. A much simpler proof of Konno’s theorem has recen...

Journal: :JTAER 2006
Heike Neumann Thomas Schwarzpaul

For real-world applications digital coin systems, i.e., off-line payment systems offering not only the unforgeability of conventional coins but also the anonymity of customers making purchases, need to have some additional features. One of these additional features is the hardware protection of the system, provided by dedicated tamper-resistant devices called observers which are used to physica...

1998
Agnes Hui Chan Yair Frankel Yiannis Tsiounis

Recently, there has been an interest in creating practical anonymous electronic cash with the ability to conduct payments of exact amounts, as is typically the practice in physical payment systems. The most general solution for such payments is to allow electronic coins to be divisible (e.g., each coin can be spent incrementally but total purchases are limited to the monetary value of the coin)...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید