نتایج جستجو برای: party action

تعداد نتایج: 642404  

2003
Daniel Cvrček

Trust can have its life-cycle and we can model it and utilize it for establishing secure environment for mobile environments. We assume that entities in the collaborating environment are mobile. It is not possible to perform entity enrollment. There is no globally trusted third party. Usual authentication mechanisms can not be used. We propose use of trust based on principal behaviour observati...

1998
Ian R McChesney

Software development is characterized by its multi-party activity and a major challenge in managing the software process is the coordination of the tasks, resources and people constituting this activity. The language/action perspective offers concepts and constructs which address such concerns. In this paper, CoPlans are presented as an approach for modelling the coordination of multi-party act...

1995
Rosario Gennaro

Veriiable Secret Sharing is a fundamental primitive for secure cryptographic design. We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself. Indeed our deenition, and so our protocol sa...

Journal: :پژوهش های فقهی 0
عباس میرشکاری استادیار دانشگاه علم و فرهنگ

bailsman is commitment to summon party .this commitment on suspect of some, cause dominate on the third-party .for this reason, some have questioned the validity of contract, other groups have attempted to justify the validity of the contract with using of joint and several liability and advocacy. in sunni jurisprudence, the first tool used and in shiie, the second tool. but the truth is that t...

2016
Daniel Genkin Antigoni Polychroniadou Yuval Ishai Manoj M. Prabhakaran Amit Sahai

1 I Side Channel Attacks 3

2018
Jason N. Doctor Jaideep Vaidya Xiaoqian Jiang Shuang Wang Lisa M. Schilling Toan Ong Michael E. Matheny Lucila Ohno-Machado Daniella Meeker

Secure computation of equivalence has fundamental application in many different areas, including healthcare. We study this problem in the context of matching an individual’s identity to link medical records across systems. We develop an efficient solution for equivalence based on existing work that can evaluate the “greater than” relation. We implement the approach and demonstrate its effective...

2014
Xiong Fan Kartik Nayak

Oblivious transfer is widely used in secure multiparty computation. In this paper, we propose a game theoretic analysis of this primitive and discuss how a protocol for efficient rational oblivious transfer should be in the real world.

1993
Marty Sirkin Don Batory Vivek Singhal

PREDATOR is a data structure precompiler that generates efficient code for maintaining and querying complex data structures. It embodies a novel component reuse technology that transcends traditional generic data types. In this paper, we explain the concepts of our work and our prototype system. We show how complex data structures can be specified as compositions of software building blocks, an...

2000
Jacob Löfvenberg Tina Lindkvist

The paper describes all possible pirate strategies in a binary fingerprinting scheme. It is shown how to make a compact representation of the strategies by choosing representatives from equivalence classes of pirate strategies.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید