نتایج جستجو برای: third party

تعداد نتایج: 267981  

Journal: :Inf. Manag. Comput. Security 2005
Jianying Zhou Jose Antonio Onieva Javier López

Purpose – As a value-added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. This paper aims to present two optimized multi-party certified email protocols. Design/methodology/approach – Reviews two existing email protocols and provides...

2015
Jeonghye Kim Youngseog Yoon Hangjung Zo

We empirically analyze the competitive benefits of sharing economy services to understand why people participate in the sharing economy. We employ the social exchange theory to examine the participation intention in sharing over owning. We emphasize on the importance of service platform as a trusted third party and its influence on reducing the perceived risk of sharing economy. The research mo...

Journal: :IACR Cryptology ePrint Archive 2017
Yi Liu Qi Wang

Because of the properties such as transparency, decentralization, irreversibility, nonrepudiation, etc., blockchain is not only a fundamental technology of great interest in its own right, but also has large potential when integrated into many other areas. In this paper, based on the blockchain technology, we propose a decentralized e-voting protocol, without the existence of a trusted third pa...

2004
Vilgot Claesson Neeraj Suri

This paper develops solutions for efficient transfer of sporadic (event-triggered) data over a time-triggered communication channel. We present novel and efficient techniques for composite provisioning of the event triggered (ET) and time triggered (TT) paradigms to achieve both the predictability and flexibility inherent in TT and ET systems respectively. As a tangible demonstration of the tec...

2016
Muqeet Ali Rezwana Reaz Mohamed G. Gouda

A nonrepudiation protocol from party S to party R performs two tasks. First, the protocol enables party S to send to party R some text x along with sufficient evidence (that can convince a judge) that x was indeed sent by S. Second, the protocol enables party R to receive text x from S and to send to S sufficient evidence (that can convince a judge) that x was indeed received by R. Almost every...

2017
Stefan Wüller Ulrike Meyer Susanne Wetzel

Both B2B bartering as well as bartering between individuals is increasingly facilitated through online platforms. However, typically these platforms lack automation and tend to neglect the privacy of their users by leaking crucial information about trades. It is in this context that we devise the first privacypreserving protocol for automatically determining an actual trade between multiple par...

1998
Michiharu Kudo

This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, and explains defense measures that use a trusted third party to provide temporal accountability. We propose a secure electronic submission protocol as a typical time-sensitive application and a temporal accountability lo...

Journal: :Journal of child language 2011
Carmen Martínez-Sussmann Nameera Akhtar Gil Diesendruck Lori Markson

Children as young as two years of age are able to learn novel object labels through overhearing, even when distracted by an attractive toy (Akhtar, 2005). The present studies varied the information provided about novel objects and examined which elements (i.e. novel versus neutral information and labels versus facts) toddlers chose to monitor, and what type of information they were more likely ...

2001
Judith Stafford Kurt Wallnau

Developing software systems that are composed in total or in part from software components over which the developer has little control presents difficulties not yet addressed by componentbased software engineering research. Among the problems associated with such component-based development is the potential for a component developer to misrepresent the quality of components. It is therefore par...

2015
Reza Farzipoor Saen

The use of Data Envelopment Analysis (DEA) in many fields is based on total flexibility of the weights. However, the problem of allowing total flexibility of the weights is that the values of the weights obtained by solving the unrestricted DEA program are often in contradiction to prior views or additional available information. Also, many applications of DEA assume complete discretionary of d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید