نتایج جستجو برای: third e
تعداد نتایج: 1245303 فیلتر نتایج به سال:
Reputation systems are a major feature of every modern e-commerce website, helping buyers carefully choose their service providers and products. However, most websites use centralized reputation systems, where the security of the system rests entirely upon a single Trusted Third Party. Moreover, they often disclose the identities of the raters, which may discourage honest users from posting fra...
Even though Public Key Infrastructure (PKI) and X.509 certificate has been a prominent security model for a variety of e-commerce applications and large scale distributed computing, it has not been sufficiently investigated in the certificate revocation and verification mechanism. In this paper, we discuss the need and importance of certificate revocation and verification, and analyze the limit...
Network exchange is now widely used. However, it still cannot avoid the problems evolving from network exchange. For example. A buyer may not receive the order even if he/she makes the payment. For another example, the seller possibly get nothing even when the merchandise is sent. Some studies about the fair exchange have proposed protocols for the design of efficiency and exploited the signatu...
This paper presents a cryptanalysis of Pseudonymous Digital Signature(PDS) described in [8]. PDS proposed with respect to Pseudonymous Identification Scheme Intended to generate pseudonyms by trusted third party (usually the pseudonymity service provider) for registered users and organizations that provides on –line services. The results shows that the PDS very fast and highly secure with a com...
چکیده : آرای صادره از دادگاه ها علاوه بر شیوه های عادی از طریق فوق العاده نیز قابل اعتراض و رسیدگی مجدد هستند. در مواقعی که رای دادگاه مخل به حقوق ثالث باشد وی می تواند به ان اعتراض کند. قلمرو شمول اعتراض ثالث به تصمیمات قضایی که از آن به رای تعبیر شده محدود می گردد. ولی در مورد قرارها که به اعدادی و نهایی تفکیک می شوند، چون هیچ رویه ثابت و مشخصی در این زمینه در دادگاهها وجود نداشته و همچنین ا...
Reputation systems are a major feature of every modern e-commerce website, helping buyers carefully choose their service providers and products. However, most websites use centralized reputation systems, where the security of the system rests entirely upon a single Trusted Third Party. Moreover, they often disclose the identities of the raters, which may discourage honest users from posting fra...
We perform the first complete analysis of nd scattering at next–to–next–to–leading order in chiral effective field theory including the corresponding three–nucleon force and extending our previous work, where only the two–nucleon interaction has been taken into account. The three–nucleon force appears first at this order in the chiral expansion and depends on two unknown parameters. These two p...
Regulators and actors in international trade are facing a difficult challenge of increasing control and security while at the same time lowering the administrative burden for traders. As a tentative response, the European Commission has introduced the concept of “trusted traders”: certified traders that are in control of their business. Trusted traders are entitled to trade facilitations, faste...
In an electronic commerce environment, the merchant and the customer are unlikely to trust each other. This problem has motivated researchers to propose fair-exchange protocols based on using an on-line trusted third party; the third party receives the items being exchanged from the customer and the merchant and then forwards it to the other party in a fair manner. However, the third party is a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید