نتایج جستجو برای: verifiability

تعداد نتایج: 874  

Journal: :JEADV Clinical Practice 2022

A nonfungible token (NFT) represents an arbitrary piece of information, which can be created and exchanged on a blockchain, type public ledger secured by cryptographic algorithms. NFTs offer the possibility leveraging blockchain technology-related benefits, including verifiability, transparent execution, high availability tamper-resistance, for any tokenizable information such as example, clini...

2011
Fatih Karayumak Michaela Kauer Maina M. Olembo Melanie Volkamer

Internet voting has for many years attracted the attention of the general public, election officials and security researchers. However, only very few remote internet voting systems have been used in actual elections. Those election officials that enabled remote electronic voting rarely use voting protocols proposed by the security and cryptography community, instead opting for black box systems...

Journal: :Journal of Investigative Psychology and Offender Profiling 2016

Journal: :Applied sciences 2022

The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not simple task; it cumbersome since traditional schemes in databases could be subject to modifications. However, can solved using blockchain technology. paper provid...

Journal: :Journal of Universal Computer Science 2021

There is no standard method for describing the Operational Design Domain (ODD) in automated driving vehicles. are many elements operating domain, including external environment, and it necessary to connect them with internal state of system. Its content ultimately requires user's understanding. The description this ODD summarised from aspect safety. Consistency standards guidelines will...

2016
Bennett Kleinberg Galit Nahari Bruno Verschuere

The Verifiability Approach (VA) is a promising new approach for deception detection. It extends existing verbal credibility assessment tools by asking interviewees to provide statements rich in verifiable detail. Details that i) have been experienced with an identifiable person, ii) have been witnessed by an identifiable person, or iii) have been recorded through technology, are labelled as ver...

Journal: :Journal of Systems and Software 2008
Yu-Fang Chung Kuo-Hsuan Huang Hsiu-Hui Lee Feipei Lai Tzer-Shyong Chen

This work studies the English auction protocol, which comprises three interactive parties—the Registration Manager, the Auction Manager and the Bidder. The registration manager confirms and authenticates the identities of bidders; the auction manager issues the bidding rights and maintains order in holding the auction. The proposed scheme provides the following security features—anonymity, trac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید