Information Exchange between Different Protocols
نویسندگان
چکیده
منابع مشابه
Exchange of Geometric Information Between Applications
The Web Geometry Laboratory (WGL) is a collaborative and adaptive e-learning Web platform integrating a well known dynamic geometry system. Thousands of Geometric problems for Geometric Theorem Provers (TGTP) is a Web-based repository of geometric problems to support the testing and evaluation of geometric automated theorem proving systems. The users of these systems should be able to profit fr...
متن کاملInformation exchange between provider and patient.
Carl van Walraven and colleagues recently presented a timely article about the information gaps that impede continuity of care for Canadian patients. Both the article and the accompanying commentary discussed the potential of electronic health records for facilitating provider-to-provider information sharing. This possibility is becoming a reality as the Canada Health Infoway works to establish...
متن کاملDiffie-Hellman type key exchange protocols based on isogenies
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward generalization of elliptic curve Diffie-Hellman key exchange. The method uses commutativity of the endomorphism ring $ End(E) $. Then using dual isogenies, we propose...
متن کاملThe relationship between stock liquidity risk and financial information quality criteria in Tehran Stock Exchange
The current study aims to investigate the relationship between stock liquidity risk and financial information quality criteria (i.e. the timely dividends announcement, accruals quality and the percentage of profitability prediction error) of companies listed on the Tehran Stock Exchange. For this purpose, 148 cases of data from listed companies, collected from 2007 to 2012, were employed in ord...
متن کاملRisk Balance in Exchange Protocols
We study the behaviour of rational agents in exchange protocols which rely on trustees. We allow malicious parties to compromise the trustee by paying a cost and, thereby, present a game analysis that advocates exchange protocols which induce balanced risks on the participants. We also present a risk-balanced protocol for fair confidential secret comparison.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2017
ISSN: 2321-9653
DOI: 10.22214/ijraset.2017.3186