نتایج جستجو برای: adversary legal system
تعداد نتایج: 2314073 فیلتر نتایج به سال:
The theory of distributed computing, lagging in its development behind practice, has been biased in its modelling by employing mechanisms within the model mimicking reality. Reality means, processors can fail. But theory is about predicting consequences of reality, hence if we capture reality by “artificial models,” but those nevertheless make analysis simpler, we should pursue the artificial m...
In this paper we propose a new anonymous password-based authenticated key exchange protocol. The communication cost of our protocol is sub-linear ( ), O N which improves a previous one of O(N) cost, where N is the number of users in the system. We show that the session key is secure against an active adversary in the random oracle model and identity anonymity is secure against a semi-honest adv...
promise de port fort is an useful legal basic for justification many civil and commercial transactions. such as bank guaranties, insurance and guaranty of things it divides two legal relations, relation between parties if third party not ratify and relation with third party if she or he ratify that promise. unlike its appearance, it, is not violation the principle of relativity of contracts. be...
Using password based authentication technique, a system maintains the login credentials (username, password) of the users in a password file. Once the password file is compromised, an adversary obtains both the login credentials. With the advancement of technology, even if a password is maintained in hashed format, then also the adversary can invert the hashed password to get the original one. ...
We propose a probabilistic system model for anonymous ad hoc routing protocols that takes into account the a priori knowledge of the adversary, and illustrate how the information theoretical entropy can be used for quantification of the anonymity offered by a routing protocol as the adversary captures an increasing number of nodes in the network. The proposed measurement schema is applied to AN...
the principal of conformity with the law (sehat) is recognized in iranian legal system. in this article, at first we analyze this principle in respect with the iranian jurisprudence in order to demonstrate the legal evaluation. subsequently, we analyses the realistical approach of the jurist in lex mercatori in such regards with due respect to the doctrine and arbitration awards in internationa...
Human Cloning phenomenon that is accounted as one of the challenges of the present century is concentrated by legal community of most of the countries. One of the prior countries that reacted against this new phenomenon and took actions in legalization is America. Considering this country’s legal system, in the present article it is tried to explain legal condition of human Cloning in the...
Use of some cryptographic protocols implies a commitment to the data operated on by those protocols. For example, a digital signature may ensure the property of nonrepudiation: the signer would be unable to claim that the signed document is a forgery. Similarly, encrypting data can form a kind of commitment to the data: the decryption process reveals the committed plaintext. In some scenarios, ...
In the framework of distributed network computing, it is known that, for every network predicate, each network configuration that satisfies this predicate can be proved using distributed certificates which can be verified locally. However, this requires to leak information about the identities of the nodes in the certificates, which might not be applicable in a context in which privacy is desir...
While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the explanations are informal; others are embodied in formal methods, particularly in formal methods for the analysis of security protocols. This note (intended to accompany a talk at the Crypto 2000 conference) describes some of t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید