نتایج جستجو برای: ultra vires acts regarding third parties become valid

تعداد نتایج: 1000902  

2009
Krish Eswaran Krishnan Eswaran Kannan Ramchandran

Communication and Third Parties: Costs, Cues, and Confidentiality by Krishnan Eswaran Doctor of Philosophy in Engineering—Electrical Engineering and Computer Sciences and the Designated Emphasis in Communication, Computation, and Statistics University of California, Berkeley Professor Michael Gastpar, Chair This thesis tells the story of Alice and Bob, who wish to share information. However, Al...

2014
Jonathan Bone Antonio S Silva Nichola J Raihani

Punishment of defectors and cooperators is prevalent when their behaviour deviates from the social norm. Why atypical behaviour is more likely to be punished than typical behaviour remains unclear. One possible proximate explanation is that individuals simply dislike norm violators. However, an alternative possibility exists: individuals may be more likely to punish atypical behaviour, because ...

2005
Alexander Iliev Sean Smith

We investigate the use of trustworthy devices, which function as trusted third parties (TTPs), to solve general two-party Secure Function Evaluation (SFE) problems. We assume that a really trustworthy TTP device will have very limited protected memory and computation environment—a tiny TTP. This precludes trivial solutions like "just run the function in the TTP". Traditional scrambled circuit e...

2015
Maarten van Elsas Jan C.A. van der Lubbe Jos H. Weber

We propose a digital signature scheme for dynamic coalitions. Particularly, we enable members to join and leave. Our scheme does not need trusted or oblivious third parties (TTPs or OTPs). In this distributed scheme there is a changing secret group key dependent on the members in the group. Each member’s secret key remains the same for all group compositions. The downside of this approach is th...

2010
Branko Milanovic

endorsing or planning coursework/other institutional needs. You may store and print the file and share it with others helping you with the specified purpose, but under no circumstances may the file be distributed or otherwise made accessible to any other third parties without the express prior permission of Palgrave Macmillan. Please contact [email protected] if you have any queries regarding...

2012
Herbert Gintis

reviewing, endorsing or planning coursework/other institutional needs. You may store and print the file and share it with others helping you with the specified purpose, but under no circumstances may the file be distributed or otherwise made accessible to any other third parties without the express prior permission of Palgrave Macmillan. Please contact [email protected] if you have any querie...

2016
Jiqun Liu Yiwei Wang

Social Q&A (SQA) sites that allow users to exchange knowledge by asking and answering questions in natural language have become increasingly popular due to their ability to leverage the wisdom of crowds and provide personalized answers. Considerable research efforts have been devoted to studying users’ information and knowledge sharing within SQA sites. Past research, however, has neglected use...

Journal: :CoRR 2016
Adnan Memon

This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security and eliminate the dependency on single trusted third party. This protocol for communication between a device and two trusted third parties uses the piggy bank cryptographic paradigm. We also present a protocol to give law enforcing agencies access to sensitive information present on...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید