نتایج جستجو برای: asymmetric verifiability
تعداد نتایج: 66461 فیلتر نتایج به سال:
Our overall aim is to provide a verification framework for practical multi-agent systems. To achieve practicality, we must be able to describe and implement heterogeneous multi-agent systems. To achieve verifiability, we must define semantics appropriately for use in formal verification. Thus, in this paper, we tackle the problem of implementing heterogeneous multi-agent systems in a semantical...
In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem in order to deal with more general access structures. Aspects like verifiability, secret sharing homomorphisms and multiplicative properties are also discussed. AMS Subject Classification: 94A62, 11A07
This paper is about secure remote examination. It presents Remark! , an electronic exam protocol which achieves several authentication, (conditional) anonymity, privacy, and verifiability properties without trusted third parties. Remark! is primarily designed for invigilated Internet-based exams but it also fits computer-based exams with candidates taking their exam in classrooms.
A nonfungible token (NFT) represents an arbitrary piece of information, which can be created and exchanged on a blockchain, type public ledger secured by cryptographic algorithms. NFTs offer the possibility leveraging blockchain technology-related benefits, including verifiability, transparent execution, high availability tamper-resistance, for any tokenizable information such as example, clini...
Internet voting has for many years attracted the attention of the general public, election officials and security researchers. However, only very few remote internet voting systems have been used in actual elections. Those election officials that enabled remote electronic voting rarely use voting protocols proposed by the security and cryptography community, instead opting for black box systems...
The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not simple task; it cumbersome since traditional schemes in databases could be subject to modifications. However, can solved using blockchain technology. paper provid...
There is no standard method for describing the Operational Design Domain (ODD) in automated driving vehicles. are many elements operating domain, including external environment, and it necessary to connect them with internal state of system. Its content ultimately requires user's understanding. The description this ODD summarised from aspect safety. Consistency standards guidelines will...
abstract background: increase in nitric oxide (no) concentration accompanied by alteration in peritoneal immune defense reactions is involved in the pathogenesis of endometriosis. asymmetric dimethylarginine is an endogenous competitive inhibitor of no synthase. this study was designed to compare no metabolite (nitrite), asymmetric dimethylarginine, and estradiol concentrations in serum and per...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید