نتایج جستجو برای: and third
تعداد نتایج: 16842781 فیلتر نتایج به سال:
We present an efficient off-line divisible e-cash scheme which is truly anonymous without a trusted third party. This is the second scheme in the literature which achieves full unlinkability and anonymity, after the seminal work proposed by Canard and Gouget. The main trick of our scheme is the use of a bounded accumulator in combination with the classical binary tree approach. The aims of this...
Large scale Open Systems are built from reusable components in such a way that enhanced system functionality can be deployed, quickly and effectively, simply by plugging in a few new or revised components. At the architectural level, when new variations of a system are being planned by (re)configuring reusable components, the architecture description can itself become very large and complex. Co...
Software evolution and reuse is more likely to receive higher payoff if high-level artifacts—such as architectures and designs—can be reused and can guide low-level component reuse. In practice, however, high-level artifacts are often not appropriately captured. This paper presents an approach to capturing and assessing software architectures for evolution and reuse. The approach consists of a ...
Electronic transactions with commercial values between two business parties may want to be legally bound. Digital signature is an important security mechanism to provide evidence regarding the status of a transaction. However, evidence solely based on digital signatures may not enforce strong nonrepudiation. Additional mechanisms are required to make digital signatures as valid non-repudiation ...
Cost associated with the maintenance and scale of custom services presents one of the most significant barriers to entry for information providers. One solution proposes pushing computation into the cloud where providers like Amazon maintain a scalable, world-wide platform for virtualization. While this avoids certain hardware maintenance costs, service providers must still maintain clusters of...
Corresponding Author: Jaratsri Rungratanaubol Department of Computer Science and Information Technology, Faculty of Science, Naresuan University, Phitsanulok, Thailand Email: [email protected] Abstract: Thai Traditional Medicine (TTM) is an integral part of Thai traditional culture, with a history which spans many centuries. As part of this tradition, a significant number of historical pharmac...
Contract signing is a fundamental service in doing business. The Internet has facilitated the electronic commerce, and it is necessary to find appropriate mechanisms for contract signing in the digital world. A number of two-party contract signing protocols have been proposed with various features. Nevertheless, in some applications, a contract may need to be signed by multiple parties. Less re...
introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
the present study reports an analysis of response articles in four different disciplines in the social sciences, i.e., linguistics, english for specific purposes (esp), accounting, and psychology. the study has three phases: micro analysis, macro analysis, and e-mail interview. the results of the micro analysis indicate that a three-level linguistic pattern is used by the writers in order to cr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید