نتایج جستجو برای: asymmetric verifiability

تعداد نتایج: 66461  

2008
Louise A. Dennis Michael Fisher

Our overall aim is to provide a verification framework for practical multi-agent systems. To achieve practicality, we must be able to describe and implement heterogeneous multi-agent systems. To achieve verifiability, we must define semantics appropriately for use in formal verification. Thus, in this paper, we tackle the problem of implementing heterogeneous multi-agent systems in a semantical...

Journal: :IACR Cryptology ePrint Archive 2006
Sorin Iftene

In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem in order to deal with more general access structures. Aspects like verifiability, secret sharing homomorphisms and multiplicative properties are also discussed. AMS Subject Classification: 94A62, 11A07

2014
Rosario Giustolisi Gabriele Lenzini Peter Y. A. Ryan

This paper is about secure remote examination. It presents Remark! , an electronic exam protocol which achieves several authentication, (conditional) anonymity, privacy, and verifiability properties without trusted third parties. Remark! is primarily designed for invigilated Internet-based exams but it also fits computer-based exams with candidates taking their exam in classrooms.

Journal: :JEADV Clinical Practice 2022

A nonfungible token (NFT) represents an arbitrary piece of information, which can be created and exchanged on a blockchain, type public ledger secured by cryptographic algorithms. NFTs offer the possibility leveraging blockchain technology-related benefits, including verifiability, transparent execution, high availability tamper-resistance, for any tokenizable information such as example, clini...

2011
Fatih Karayumak Michaela Kauer Maina M. Olembo Melanie Volkamer

Internet voting has for many years attracted the attention of the general public, election officials and security researchers. However, only very few remote internet voting systems have been used in actual elections. Those election officials that enabled remote electronic voting rarely use voting protocols proposed by the security and cryptography community, instead opting for black box systems...

Journal: :Journal of Investigative Psychology and Offender Profiling 2016

Journal: :Applied sciences 2022

The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not simple task; it cumbersome since traditional schemes in databases could be subject to modifications. However, can solved using blockchain technology. paper provid...

Journal: :Journal of Universal Computer Science 2021

There is no standard method for describing the Operational Design Domain (ODD) in automated driving vehicles. are many elements operating domain, including external environment, and it necessary to connect them with internal state of system. Its content ultimately requires user's understanding. The description this ODD summarised from aspect safety. Consistency standards guidelines will...

Journal: :iranian journal of nursing and midwifery research 0
maryam kianpour mehdi nematbakhsh sayad mehdi ahmadi

abstract background: increase in nitric oxide (no) concentration accompanied by alteration in peritoneal immune defense reactions is involved in the pathogenesis of endometriosis. asymmetric dimethylarginine is an endogenous competitive inhibitor of no synthase. this study was designed to compare no metabolite (nitrite), asymmetric dimethylarginine, and estradiol concentrations in serum and per...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید