نتایج جستجو برای: spending

تعداد نتایج: 16337  

Journal: :J. Parallel Distrib. Comput. 2011
Bogdan Carbunar Weidong Shi Radu Sion

We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are able to remunerate payees for services that depend on future, yet to be determined outcomes of events. Moreover, payees are able to further transfer payments to third parties. Once payment complete, any double-spending...

Journal: :Canadian Journal of Economics/Revue canadienne d'économique 2008

This paper aims to investigate the effect of budget deficit shock on government spending in Indonesia. For this propose, this reasearch uses an alternative error correction model based on loss function of government spending. The model assumes the short run disequilibrium, in which shock variables may play an important role. A spesific loss function model is applied to develop the long run gove...

2002
T. C. Lam Victor K.-W. Wei

We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek penalties. The agent migration protocol is offline (non-centralized). The itinerary of an agent is privacy-protected. Our scheme is based on Wong’s transferable extension [Won01] of Ferguson’s single-term offline untr...

Journal: :CoRR 2017
Siamak Solat

A decentralized payment system is not secure if transactions are transferred directly between clients. In such a situation it is not possible to prevent a client from redeeming some coins twice in separate transactions that means a double-spending attack. Bitcoin uses a simple method to preventing this attack i.e. all transactions are published in a unique log (blockchain) [17,38]. This approac...

Journal: :IACR Cryptology ePrint Archive 2014
Yalin Chen Jue-Sam Chou

Recently, Baseri et al. proposed a secure untraceable off-line electronic cash system. They claimed that their scheme could achieve security requirements of an e-cash system such as, untraceability, anonymity, unlinkability, double spending checking, un-forgeability, date-attachability, and prevent forging coins. They further prove the un-forgeability security feature by using the hardness of d...

2017
Heather L Sipsma Maureen Canavan Melissa Gilliam Elizabeth Bradley

OBJECTIVE To examine whether greater state-level spending on social and public health services such as income, education and public safety is associated with lower rates of teenage births in USA. DESIGN Ecological study. SETTING USA. PARTICIPANTS 50 states. PRIMARY OUTCOME MEASURE Our primary outcome measure was teenage birth rates. For analyses, we constructed marginal models using rep...

2013
Jaap-Henk Hoepman

We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (e.g., in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several ...

Journal: :IACR Cryptology ePrint Archive 2014
Yalin Chen Jue-Sam Chou

Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme with fast anonymity revoking. They claimed that their scheme could achieve security requirements of an e-cash system such as, anonymity, unlinkability, double spending checking, anonymity control, and rapid anonymity revoking on double spending. They further formally prove the unlinkability and the un-forgeability...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید