نتایج جستجو برای: defense spending

تعداد نتایج: 92420  

2001
Hua Wang Yanchuan Zhang

Electronic cash has been playing an important role in electronic commerce. One of the desirable characteristics is its traceability, which can prevent money laundering and can find the destination of suspicious withdrawals. In this paper we develop a new scheme for untraceable electronic cash, in which the bank involvement in the payment transaction between a user and a receiver is eliminated. ...

Journal: :J. Parallel Distrib. Comput. 2011
Bogdan Carbunar Weidong Shi Radu Sion

We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are able to remunerate payees for services that depend on future, yet to be determined outcomes of events. Moreover, payees are able to further transfer payments to third parties. Once payment complete, any double-spending...

Journal: :Canadian Journal of Civil Engineering 2021

The United States Army Corps of Engineering Manual 385 (EM 385) has become a vital part construction operations on all Department Defense (DOD) projects to create safer work environment. With tremendous effort developing and enforcing the EM 385, question whether EM385 provides any value for project safety is critical industry at large. This study looks causation between mishap reduction by iso...

Introduction: Increasing the level of social welfare with access the poor to order and security, education and health services, social security, increase the capacity of the economy in the chapters of agriculture, water and electricity, industries and mines, business, energy, transportation, information technology is possible. Meanwhile, the extent of government presence in how public policies ...

Journal: :Canadian Journal of Economics/Revue canadienne d'économique 2008

This paper aims to investigate the effect of budget deficit shock on government spending in Indonesia. For this propose, this reasearch uses an alternative error correction model based on loss function of government spending. The model assumes the short run disequilibrium, in which shock variables may play an important role. A spesific loss function model is applied to develop the long run gove...

2002
T. C. Lam Victor K.-W. Wei

We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek penalties. The agent migration protocol is offline (non-centralized). The itinerary of an agent is privacy-protected. Our scheme is based on Wong’s transferable extension [Won01] of Ferguson’s single-term offline untr...

Journal: :CoRR 2017
Siamak Solat

A decentralized payment system is not secure if transactions are transferred directly between clients. In such a situation it is not possible to prevent a client from redeeming some coins twice in separate transactions that means a double-spending attack. Bitcoin uses a simple method to preventing this attack i.e. all transactions are published in a unique log (blockchain) [17,38]. This approac...

Journal: :IACR Cryptology ePrint Archive 2014
Yalin Chen Jue-Sam Chou

Recently, Baseri et al. proposed a secure untraceable off-line electronic cash system. They claimed that their scheme could achieve security requirements of an e-cash system such as, untraceability, anonymity, unlinkability, double spending checking, un-forgeability, date-attachability, and prevent forging coins. They further prove the un-forgeability security feature by using the hardness of d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید