Using Focus Groups to Study Consumer Understanding and Experiences with Tamper-Evident Packaging Devices
نویسندگان
چکیده
منابع مشابه
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
Following both theoretical and practical arguments, we construct UC-secure bit-commitment protocols that place their strength on the sender’s side and are built using tamper-evident devices, e.g., a type of distinguishable, sealed envelopes. We show that by using a second formalisation of tamper-evident distinguishable envelopes we can attain better security guarantees, i.e., EUC-security. We s...
متن کاملTamper-Evident Complex Genomic Networks
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...
متن کاملA Case for Tamper-Resistant and Tamper-Evident Computer Systems
Recent industrial efforts in architectural and system support for trusted computing still leave systems wide-open even to relatively simple and inexpensive hardware-based attacks. These attacks attempt to snoop or modify data transfer between various chips in a computer system such as between the processor and memory, and between processors in a multiprocessor interconnect network. Software sec...
متن کاملUnderstanding Gamification of Consumer Experiences
Recently, organizations have begun to tout ‘gamification’ as an effective method of increasing motivation and engagement of employees, customers, patients, and students, among other stakeholders (Wingfield 2012). Nonetheless, despite projections that such gamification will become a widely adopted phenomenon, estimates are gloomy with respect to the real impact these projects will have on the ex...
متن کاملImplementing a Tamper-Evident Database System
Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount of trusted client-side computation to achieve guarantees of integrity when interacting with a vulnerable or untrusted database server. To achieve this goal we describe a novel relational hash tree, designed for efficient databa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Food Science Education
سال: 2009
ISSN: 1541-4329,1541-4329
DOI: 10.1111/j.1541-4329.2009.00071.x