نتایج جستجو برای: party action
تعداد نتایج: 642404 فیلتر نتایج به سال:
Trust can have its life-cycle and we can model it and utilize it for establishing secure environment for mobile environments. We assume that entities in the collaborating environment are mobile. It is not possible to perform entity enrollment. There is no globally trusted third party. Usual authentication mechanisms can not be used. We propose use of trust based on principal behaviour observati...
Software development is characterized by its multi-party activity and a major challenge in managing the software process is the coordination of the tasks, resources and people constituting this activity. The language/action perspective offers concepts and constructs which address such concerns. In this paper, CoPlans are presented as an approach for modelling the coordination of multi-party act...
Veriiable Secret Sharing is a fundamental primitive for secure cryptographic design. We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself. Indeed our deenition, and so our protocol sa...
bailsman is commitment to summon party .this commitment on suspect of some, cause dominate on the third-party .for this reason, some have questioned the validity of contract, other groups have attempted to justify the validity of the contract with using of joint and several liability and advocacy. in sunni jurisprudence, the first tool used and in shiie, the second tool. but the truth is that t...
1 I Side Channel Attacks 3
Secure computation of equivalence has fundamental application in many different areas, including healthcare. We study this problem in the context of matching an individual’s identity to link medical records across systems. We develop an efficient solution for equivalence based on existing work that can evaluate the “greater than” relation. We implement the approach and demonstrate its effective...
Oblivious transfer is widely used in secure multiparty computation. In this paper, we propose a game theoretic analysis of this primitive and discuss how a protocol for efficient rational oblivious transfer should be in the real world.
PREDATOR is a data structure precompiler that generates efficient code for maintaining and querying complex data structures. It embodies a novel component reuse technology that transcends traditional generic data types. In this paper, we explain the concepts of our work and our prototype system. We show how complex data structures can be specified as compositions of software building blocks, an...
The paper describes all possible pirate strategies in a binary fingerprinting scheme. It is shown how to make a compact representation of the strategies by choosing representatives from equivalence classes of pirate strategies.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید