نتایج جستجو برای: party

تعداد نتایج: 34507  

2009
Alon Rosen D. Sotnikov

In this lecture we will discuss secure two party and multi party computation. Assume we have m parties. Each party Pi holds a private value xi, and all parties want to compute some agreed upon function f (x2, x2..., xm). We will discuss and sketch the security requirements from such a computation and what difficulties arise from those requirements. We will present a protocol, but will not prove...

2009
MAX BADER

Party politics in the former Soviet Union is fundamentally different from party politics in Western democracies in many ways. Since 1991, two crucial aspects of party politics in the less-than-democratic former Soviet republics have been the impact of authoritarian practices on party politics and the volatile nature of party politics. Starting with the observation that the creation and operatio...

2016
F. Nyabadza Tobge Yawo Alassey Gift Muchatibaya

This paper generalizes the model proposed by Misra, by considering switching between political parties. In the model proposed, the movements of members from political party B to political party C and vice versa, are considered but the net movement is considered by assuming that [Formula: see text] (a constant), which implies that the movement of members is either from party B to party C or from...

2017
Dolière Francis Somé Nataliia Bielova Tamara Rezk

Third party tracking is the practice by which third parties recognize users accross different websites as they browse the web. Recent studies show that 90% of websites contain third party content that is tracking its users across the web. Website developers often need to include third party content in order to provide basic functionality. However, when a developer includes a third party content...

Journal: :مجله مطالعات حقوق تطبیقی 0
عباس قاسمی حامد دانشیار گروه حقوق خصوصی و اقتصادی دانشکدۀ حقوق دانشگاه شهید بهشتی

concern for the protection of the weak party is a characteristic of contemporary french contract law. in the area of the obligation to provide information, the question arises as to what criterion should be applied to distinguish the weak party from the one placed in a position of power: on what basis is the party in the inferior position protected by jurisprudence and by the legislator in the ...

Journal: :JNW 2011
Yongquan Cai Fulai Cheng

In the (t, n) threshold signature schemes with the assistance of a trusted party, the trusted party easily becomes the targets of attack. And an authority which can be trusted by all players doesn't exist. So the schemes without a trusted party were proposed to solve those security problems. But all of the conventional schemes without a trusted party cannot withstand conspiracy attacks. A novel...

2014
Dafydd Fell

COMPARED TO SOME OF ITS EAST ASIAN NEIGHBORS, SUCH AS SOUTH Korea and Japan, Taiwan’s party system has been much more stable over the last two decades. Remarkably, the same two parties, the Kuomintang (KMT) and Democratic Progressive Party (DPP), dominate the party scene in 2012 as in 1986. The year 1986 was particularly significant as it was the first election in which the KMT faced a genuine ...

2014
Javier Tapia Derdei Bichara

The dynamics of recruitment within a two political party system that influence individuals through party member contact and television advertising are explored via a mathematical contagion model that includes a population of committed party members and a population of “undecided” or “susceptible” individuals. The contagion model supports multiple outcomes including two-party coexistence. In ord...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید