نتایج جستجو برای: government protocol
تعداد نتایج: 377577 فیلتر نتایج به سال:
Home medical care is currently widespread. Chronic patients represent a good target for home-care because : (i) the care protocol is precise, clear (e.g peritoneal dialysis, type 1 diabetes), (ii) patients don’t need hospital stay (except medical emergency), (iii) patients perfectly know their chronic disease. The main problem is that the care protocol is often oral and even in the case of writ...
The UK government is fielding an architecture for secure electronic mail that was designed by GCHQ. It is based on the NSA’s Message Security Protocol with a key escrow scheme based on DiffieHellman. Attempts have been made to have this protocol adopted by other governments and in various domestic applications, in the hope of entrenching commercial key escrow and simultaneously creating a enoug...
One fundamental complexity measure of an MPC protocol is its round complexity. Asharov et al. recently constructed the first three-round protocol for general MPC in the CRS model. Here, we show how to achieve this result with only two rounds. We obtain UC security with abort against static malicious adversaries, and fairness if there is an honest majority. Additionally the communication in our ...
The Greenhouse Gas (GHG) Protocol Corporate Accounting and Reporting Standard provides a step-bystep guide for companies and government agencies to use in quantifying and reporting their GHG emissions. This set of standards was developed by the Greenhouse Gas Protocol Initiative, a partnership convened by the World Resources Institute (WRI) and the World Business Council for Sustainable Develop...
Securing Authentication of TCP/IP Layer Two By Modifying Challenge-Handshake Authentication Protocol
Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks are using those networks in trading their data. This imposed a challenge due to the increasing need for protecting the sensitive data traded over those networks. This research presents a mechanism to protect computers communication over open un-trusted networks, prima...
In this paper we describe a practical solution towards anonymous and verifiable databases based on the use of smartcards and the recent Improved Leighton-Micali protocol for the distribution of keys. The scheme is addressed particularly to public data held in separate government databases with the aim of preventing unauthorized government institutions from gathering and merging private data con...
The e-government application may enhance government facilities for its shareholders. Nevertheless, implementing such system faces many difficulties and obstacles. The considerable debacle of e-government inspires studies on those obstacles, especially in developing countries around the world. To examine the e-government implementation challenges more accurately, we have collected more tha...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید