نتایج جستجو برای: commitment
تعداد نتایج: 39978 فیلتر نتایج به سال:
Three commitments guide Dennett’s approach to the study of consciousness. First, an ontological commitment to materialist monism. Second, a methodological commitment to what he calls ‘heterophenomenology.’ Third, a ‘doxological’ commitment that can be expressed as the view that there is no room for a distinction between a subject’s beliefs about how things seem to her and what things actually s...
We prove in a non-black-box way that every bounded list and set commitment scheme is knowledge-binding. This is a new and rather strong security condition, which makes the security definitions for time-stamping much more natural compared to the previous definitions, which assume unpredictability of adversaries. As a direct consequence, list and set commitment schemes with partial opening proper...
The claim of quantum cryptography has always been that it can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space or technology available to the cheaters. We show that this claim does not hold for any quantum bit commitment protocol. Since many cryptographic tasks use bit commitment as a basic primitive, this r...
We review the theoretical and empirical literature on commitment devices. A commitment device is any arrangement, entered into by an individual, with the aim of making it easier to fulfill his or her own future plans. We argue that there is growing empirical evidence supporting the proposition that people demand commitment devices and that these devices can change behavior. We highlight the imp...
Recently it has been shown, that unconditionally secure quantum bit commitment schemes are in general impossible. I however argue if we allow that an honest Alice can fail with some small probability then secure protocols might exist. A scheme using quantum envelopes is proposed where the Mayers-Chau-Lo strategy fails.
This study reports on the effects of management style in successful implementation of Six Sigma. The authors collected data using a 18-item survey, classified managers from a wide range of industry, healthcare, military, and services into one of two management styles using Douglas McGregor’s Theory of X and Y, and compared these classifications among the survey respondents to determine the leve...
Research has shown that there are differences in how males and females respond to persuasive attempts. This paper examines the persuasiveness of the six persuasive strategies Reciprocity, Scarcity, Authority, Commitment and Consistency, Consensus and Liking developed by Cialdini with respect to age and gender. The results of the large-scale study (N = 1108) show that males and females differ si...
Quantum protocols for coin flipping can be composed in series in such a way that a cheating party gains no extra advantage from using entanglement between different rounds. This composition principle applies to coin-flipping protocols with cheat sensitivity as well, and is used to derive two results: There are no quantum strong coin-flipping protocols with cheat sensitivity that is linear in th...
We revisit the Two-Prover Bit Commitment Scheme of BenOr, Goldwasser, Kilian and Wigderson [BGKW88]. First, we introduce Two-Prover Bit Commitment Schemes similar to theirs and demonstrate that although they are classically secure using their proof technique, we also show that if the provers are allowed to share quantum entanglement, they are able to successfully break the binding condition. Se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید