JUDITH MERKLE RILEY

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dylan Riley

The essays in The Politics of Method in the Human Sciences contribute to a historical and comparative sociology of social science by systematically comparing the rises, falls, and absences of ‘‘methodological positivism’’ across the human sciences. Although all of the essays are of extremely high quality, three contributions develop the argument most fully: George Steinmetz’s introduction and W...

متن کامل

Merkle Puzzles are Optimal

We prove that every key exchange protocol in the random oracle model in which the honest users make at most n queries to the oracle can be broken by an adversary making O(n) queries to the oracle. This improves on the previous Ω̃(n) query attack given by Impagliazzo and Rudich (STOC ’89). Our bound is optimal up to a constant factor since Merkle (CACM ’78) gave an n query key exchange protocol i...

متن کامل

Improved Merkle Cryptosystem (IMC)

Merkle Cryptosystem (MC) is the first cryptosystem which introduces general concept of the public key cryptography. In this paper, we propose Improved Merkle Cryptosystem (IMC), which has significant security advantages over both MC and a variant of MC (VMC). In IMC, cryptographic hash functions and a new puzzle structure are used together in order to increase the security of MC and VMC. The ke...

متن کامل

Sabine Braun and Judith

s/23_abstract_Videoconferencing_Norway.pdf; http://www.ccbe.org/fileadmin/user_upload/document/E-Justice_Portal/17-18_02_2009/ Presentations/23_Videoconferencing_in_Norwegian_courts.pdf 34 http://www.haaretz.co.il/hasite/spages/808333.html 35 http://www.lantech.co.ke/index.php?option=com_content&view=article&id=57&Itemid=74 36 http://www.supremecourt.tas.gov.au/about_us/courtroom_technology/ vi...

متن کامل

Merkle Tree Traversal Revisited

We propose a new algorithm for computing authentication paths in the Merkle signature scheme. Compared to the best algorithm for this task, our algorithm reduces the worst case running time considerably.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PS: Political Science & Politics

سال: 2011

ISSN: 1049-0965,1537-5935

DOI: 10.1017/s104909651000212x