نتایج جستجو برای: coin
تعداد نتایج: 5819 فیلتر نتایج به سال:
Counterinsurgency does not increase the legitimacy of, or support for, central governments engaged in internal conflicts. Recent research shows quantifiable degrees of government legitimacy, national identity, and population security are necessary precursors accurate predictors a government’s ability to outlast civil uprising. Because first two predictors—government identity—can be measured do ...
Abstract In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flipping coins is indispensable in this manner, themselves never been spotlight. Therefore, we would like make physical rise level just as a deck playing cards has used perform secure multi-party computation. Such card-based protocol known be helpful both com...
Impaction of foreign body in larynx is reported exclusively in paediatric population only. Moreover impaction of coin in larynx has never been reported previously. With this background, we report a rare case of coin impaction in larynx in a healthy adult.
This note introduces some examples of quantum random walks in R and proves the weak convergence of their rescaled n-step densities. One of the examples is called the Plancherel quantum walk because the “quantum coin flip” is the Fourier Integral (or Plancherel) Transform. The other examples are the Birkhoff quantum walks, so named because the coin flips are effected by means of measure preservi...
Public-coin zero-knowledge and concurrent zero-knowledge (cZK) are two classes of zero knowledge protocols that guarantee some additional desirable properties. Still, to this date no protocol is known that is both public-coin and cZK for a language outside BPP. Furthermore, it is known that no such protocol can be black-box ZK [Pass et.al,
In clinical studies, patients are usually accrued sequentially, and, in such cases, response-adaptive designs are useful tools to generate treatment allocation schemes in which the assignment of a treatment to an incoming patient is a function of the observed treatment responses thus far. It has been shown that among the various classes of designs, doubly adaptive biased coin designs have sever...
This note introduces a quantum random walk in R and proves the weak convergence of its rescaled n-step densities. Quantum walks of the type we consider in this note were introduced in [1], which defined and analyzed the Hadamard quantum walk on Z, and a “new type of convergence theorem” for such quantum walks on Z was discovered by Konno [4, 5]. A much simpler proof of Konno’s theorem has recen...
For real-world applications digital coin systems, i.e., off-line payment systems offering not only the unforgeability of conventional coins but also the anonymity of customers making purchases, need to have some additional features. One of these additional features is the hardware protection of the system, provided by dedicated tamper-resistant devices called observers which are used to physica...
Recently, there has been an interest in creating practical anonymous electronic cash with the ability to conduct payments of exact amounts, as is typically the practice in physical payment systems. The most general solution for such payments is to allow electronic coins to be divisible (e.g., each coin can be spent incrementally but total purchases are limited to the monetary value of the coin)...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید