نتایج جستجو برای: verifiability
تعداد نتایج: 874 فیلتر نتایج به سال:
A nonfungible token (NFT) represents an arbitrary piece of information, which can be created and exchanged on a blockchain, type public ledger secured by cryptographic algorithms. NFTs offer the possibility leveraging blockchain technology-related benefits, including verifiability, transparent execution, high availability tamper-resistance, for any tokenizable information such as example, clini...
Internet voting has for many years attracted the attention of the general public, election officials and security researchers. However, only very few remote internet voting systems have been used in actual elections. Those election officials that enabled remote electronic voting rarely use voting protocols proposed by the security and cryptography community, instead opting for black box systems...
The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not simple task; it cumbersome since traditional schemes in databases could be subject to modifications. However, can solved using blockchain technology. paper provid...
There is no standard method for describing the Operational Design Domain (ODD) in automated driving vehicles. are many elements operating domain, including external environment, and it necessary to connect them with internal state of system. Its content ultimately requires user's understanding. The description this ODD summarised from aspect safety. Consistency standards guidelines will...
The Verifiability Approach (VA) is a promising new approach for deception detection. It extends existing verbal credibility assessment tools by asking interviewees to provide statements rich in verifiable detail. Details that i) have been experienced with an identifiable person, ii) have been witnessed by an identifiable person, or iii) have been recorded through technology, are labelled as ver...
This work studies the English auction protocol, which comprises three interactive parties—the Registration Manager, the Auction Manager and the Bidder. The registration manager confirms and authenticates the identities of bidders; the auction manager issues the bidding rights and maintains order in holding the auction. The proposed scheme provides the following security features—anonymity, trac...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید