نتایج جستجو برای: related party transactions

تعداد نتایج: 1218894  

Journal: :J. Information Security 2012
Khalid. O. Elaalim Shoubao Yang

A fair electronic cash system is a system that allows customers to make payments anonymously. Furthermore the trusted third party can revoke the anonymity when the customers did illegal transactions. In this paper, a new fair electronic cash system based on group signature scheme by using elliptic curve cryptography is proposed, which satisfies properties of secure group signature scheme (corre...

2003
Marco Casassa Mont Adrian Baldwin Joe Pato

This paper presents a distributed authorisation model suitable for use in a web service framework where multiple parties are involved in performing a particular transaction. The authorisation model uses a third party authorisation service that checks users or services’ credentials against a set of authorisation policies. A traditional service provision model does not scale well for such transac...

2004
Aleksandra Nenadić Ning Zhang Stephen Barton

This paper reports on the on-going Fair Integrated Data Exchange Services (FIDES) project aimed at developing a security middleware solution to support e-commerce transactions and the provision of the important fair exchange and nonrepudiation security services. Fair exchange ensures that either both business parties participating in a transaction receive the exchanged valuable items or neither...

Journal: :IEICE Transactions 2013
Toru Nakanishi Tomoya Nomura Nobuo Funabiki

Secure Multiparty Computation Privacy Assurances in Multiple Data-Aggregation Transactions. . . . . . . . . . . 3 Kim Le, Parmesh Ramanathan, and Kewal K. Saluja A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Tomas Toft Towards Secure Two-Party Computation from the Wire-Tap Channel . . . . ...

2014
Iddo Bentov Ranjit Kumaresan

We study a model of fairness in secure computation in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty. We then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-party as well as the multiparty setting (with a dishonest majority). In particular, we propose new ideal functionalities and pr...

Journal: :Decision Support Systems 2005
Indrajit Ray Indrakshi Ray Natarajan Narasimhamurthi

In an electronic commerce environment, the merchant and the customer are unlikely to trust each other. This problem has motivated researchers to propose fair-exchange protocols based on using an on-line trusted third party; the third party receives the items being exchanged from the customer and the merchant and then forwards it to the other party in a fair manner. However, the third party is a...

Journal: :J. AIS 2012
Tat Koon Koh Mark Fichman Robert E. Kraut

Research Article Tat Koon Koh Hong Kong University of Science and Technology [email protected] Mark Fichman Carnegie Mellon University [email protected] Robert E. Kraut Carnegie Mellon University [email protected] This study focuses on trust formation and development in global buyer-supplier relationships. Trust affects all business relationships, especially global business-to-business (B2B) transaction...

2007
Bill Stackpole

WE ARE NOT IN KANSAS ANYMORE The incredible growth of Internet usage has shifted routine business transactions from fax machine and telephones to e-mail and E-commerce. This shift can be attributed in part to the economical worldwide connectivity of the Internet, but also to the Internet capacity for more sophisticated types of transactions. Security professionals must understand the issues and...

Journal: :Security and Communication Networks 2021

The emergence of the cloud storage has brought great convenience to people’s life. Many individuals and enterprises have delivered a large amount data third-party server for storage. Thus, privacy protection retrieved by user needs be guaranteed. Searchable encryption technology environment is adopted ensure that information secure with retrieving data. However, most schemes only support single...

Journal: :Journal of Namibian Studies : History Politics Culture 2023

This study is to provide empirical evidence about the performance of State-Owned Enterprises in Indonesia with a two-tier board system, on effect GCG and tunneling or propping through related transactions. research uses data form annual reports Enterprises. The results this showed that 69% were showing transactions indicated 31% propping. Furthermore, obtained was simultaneously affected by tun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید