منابع مشابه
Layered Analysis of Security Ceremonies
A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...
متن کاملBuddhist Mind and Matter
Classic Buddhist thought understands the mind as arising in dependence on the body. This causal dependence may be fashioned as a kind of “Buddhist materialism”. However, this should not be confused with any variety of scientific materialism, in which ontological and/or causal reductions of mind to brain affirm matter as the fundamental entity or property. Buddhist materialism, in contrast, is a...
متن کاملCeremonies for End-to-End Verifiable Elections
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...
متن کامل17 Buddhist Bioethics
Describing anything as ‘Buddhist’, including in this case a distinctively Buddhist bioethics, is fundamentally problematic from both a historic and Buddhist point of view. Historically, the Buddhist tradition has evolved in dozens of countries for 2500 years, with no one tradition having clear doctrinal authority over the others. Internally, even if a common Buddhist ethics was implicit in the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF INDIAN AND BUDDHIST STUDIES (INDOGAKU BUKKYOGAKU KENKYU)
سال: 1983
ISSN: 1884-0051,0019-4344
DOI: 10.4259/ibk.31.561