نتایج جستجو برای: related party transactions

تعداد نتایج: 1218894  

Journal: : 2023

Secured Credit Transactions (SCTs) are necessary and unavoidable transactions that business owners engage in to ensure their businesses thrive. However, because of the possibility a person seeking take loan may be desperate taken advantage time dire need, or on other hand, party present fake properties as security for loan, there legal requirements both debtor creditor must meet. This paper add...

Journal: :CoRR 2013
Marcin Andrychowicz Stefan Dziembowski Daniel Malinowski Lukasz Mazurek

BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction’s hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a ”refund” transacti...

ژورنال: مدیریت سلامت 2016

Introduction: Data mining is a process for discovering meaningful relationships and patterns from data. Identify behavior patterns of libraries users can helps improve decision-making in libraries. This study aimed to analyze the interlibrary loan transactions in Birjand University of Medical Sciences using data mining algorithms. Methods: In this descriptive study, knowledge discovery and d...

Journal: :CoRR 2016
Johnny Dilley Andrew Poelstra Jonathan Wilkins Marta Piekarska Ben Gorlick Mark Friedenbach

Bitcoin, the first peer-to-peer electronic cash system, opened the door to permissionless, private, and trustless transactions. Attempts to repurpose Bitcoin’s underlying blockchain technology have run up against fundamental limitations to privacy, faithful execution, and transaction finality. We introduce Strong Federations: publicly verifiable, Byzantinerobust transaction networks that facili...

1999
Raghuram G. Rajan Luigi Zingales

When parties are very unequally endowed, agreement may be very difficult to reach, even if the specific transaction is easy to contract on, and fungible resources can be transferred to compensate the losing party. The very fungibility of the resource transferred makes it hard to restrict its use, changing the amount the parties involved spend in trying to grab future rents. This spill-over effe...

2010
Mohan Dhawan Chung-chieh Shan Vinod Ganapathy

Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Without proper isolation, such content can compromise the security and privacy of these Web applications. Prior techniques for isolating untrusted JavaScript code do so by restricting dangerous constructs and inlining security checks into third-party code. This paper presents a new approach that ex...

Journal: :CoRR 2014
Adam Back Iddo Bentov

In this short note we show that the Bitcoin network can allow remote parties to gamble with their bitcoins by tossing a fair or biased coin, with no need for a trusted party, and without the possibility of extortion by dishonest parties who try to abort. The superfluousness of having a trusted party implies that there is no house edge, as is the case with centralized services that are supposed ...

Journal: :Decision Support Systems 2003
Sulin Ba Andrew B. Whinston Han Zhang

Millions of dollars change hands daily through online auction markets. However, fraud has been on the rise in these markets. Using a game theoretic approach, we propose a design of an economic incentive mechanism, the trusted third party (TTP), to serve the online auction communities. The proposed model addresses both the economic and technological aspects of online auction transactions by assi...

2012
Florim IDRIZI Ilia NINKA

Secure communications are an important precondition of e-commerce transactions and are required for confidential electronic communications. Every e-commerce system relies on encryption to secure data transmission by controlling data access and protect information on the internet and ultimately boost consumer confidence. By implementing encryption, integrity is maintained while digital authentic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید