نتایج جستجو برای: third party
تعداد نتایج: 267981 فیلتر نتایج به سال:
Purpose – As a value-added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. This paper aims to present two optimized multi-party certified email protocols. Design/methodology/approach – Reviews two existing email protocols and provides...
We empirically analyze the competitive benefits of sharing economy services to understand why people participate in the sharing economy. We employ the social exchange theory to examine the participation intention in sharing over owning. We emphasize on the importance of service platform as a trusted third party and its influence on reducing the perceived risk of sharing economy. The research mo...
Because of the properties such as transparency, decentralization, irreversibility, nonrepudiation, etc., blockchain is not only a fundamental technology of great interest in its own right, but also has large potential when integrated into many other areas. In this paper, based on the blockchain technology, we propose a decentralized e-voting protocol, without the existence of a trusted third pa...
This paper develops solutions for efficient transfer of sporadic (event-triggered) data over a time-triggered communication channel. We present novel and efficient techniques for composite provisioning of the event triggered (ET) and time triggered (TT) paradigms to achieve both the predictability and flexibility inherent in TT and ET systems respectively. As a tangible demonstration of the tec...
A nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with sufficient evidence (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to receive text x from S and to send to S sufficient evidence (that can convince a judge) that x was indeed received by R. Almost every...
Both B2B bartering as well as bartering between individuals is increasingly facilitated through online platforms. However, typically these platforms lack automation and tend to neglect the privacy of their users by leaking crucial information about trades. It is in this context that we devise the first privacypreserving protocol for automatically determining an actual trade between multiple par...
This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, and explains defense measures that use a trusted third party to provide temporal accountability. We propose a secure electronic submission protocol as a typical time-sensitive application and a temporal accountability lo...
Children as young as two years of age are able to learn novel object labels through overhearing, even when distracted by an attractive toy (Akhtar, 2005). The present studies varied the information provided about novel objects and examined which elements (i.e. novel versus neutral information and labels versus facts) toddlers chose to monitor, and what type of information they were more likely ...
Developing software systems that are composed in total or in part from software components over which the developer has little control presents difficulties not yet addressed by componentbased software engineering research. Among the problems associated with such component-based development is the potential for a component developer to misrepresent the quality of components. It is therefore par...
The use of Data Envelopment Analysis (DEA) in many fields is based on total flexibility of the weights. However, the problem of allowing total flexibility of the weights is that the values of the weights obtained by solving the unrestricted DEA program are often in contradiction to prior views or additional available information. Also, many applications of DEA assume complete discretionary of d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید