نتایج جستجو برای: defense spending
تعداد نتایج: 92420 فیلتر نتایج به سال:
Electronic cash has been playing an important role in electronic commerce. One of the desirable characteristics is its traceability, which can prevent money laundering and can find the destination of suspicious withdrawals. In this paper we develop a new scheme for untraceable electronic cash, in which the bank involvement in the payment transaction between a user and a receiver is eliminated. ...
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are able to remunerate payees for services that depend on future, yet to be determined outcomes of events. Moreover, payees are able to further transfer payments to third parties. Once payment complete, any double-spending...
PREDICTIVE ANALYTICS ON ENGINEER MANUAL 385 EFFECTIVENESS OF REDUCING NUMBER AND SEVERITY OF MISHAPS
The United States Army Corps of Engineering Manual 385 (EM 385) has become a vital part construction operations on all Department Defense (DOD) projects to create safer work environment. With tremendous effort developing and enforcing the EM 385, question whether EM385 provides any value for project safety is critical industry at large. This study looks causation between mishap reduction by iso...
Introduction: Increasing the level of social welfare with access the poor to order and security, education and health services, social security, increase the capacity of the economy in the chapters of agriculture, water and electricity, industries and mines, business, energy, transportation, information technology is possible. Meanwhile, the extent of government presence in how public policies ...
This paper aims to investigate the effect of budget deficit shock on government spending in Indonesia. For this propose, this reasearch uses an alternative error correction model based on loss function of government spending. The model assumes the short run disequilibrium, in which shock variables may play an important role. A spesific loss function model is applied to develop the long run gove...
We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek penalties. The agent migration protocol is offline (non-centralized). The itinerary of an agent is privacy-protected. Our scheme is based on Wong’s transferable extension [Won01] of Ferguson’s single-term offline untr...
RDV: Register, Deposit, Vote: a full decentralized consensus algorithm for blockchain based networks
A decentralized payment system is not secure if transactions are transferred directly between clients. In such a situation it is not possible to prevent a client from redeeming some coins twice in separate transactions that means a double-spending attack. Bitcoin uses a simple method to preventing this attack i.e. all transactions are published in a unique log (blockchain) [17,38]. This approac...
Recently, Baseri et al. proposed a secure untraceable off-line electronic cash system. They claimed that their scheme could achieve security requirements of an e-cash system such as, untraceability, anonymity, unlinkability, double spending checking, un-forgeability, date-attachability, and prevent forging coins. They further prove the un-forgeability security feature by using the hardness of d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید