نتایج جستجو برای: adversary legal system

تعداد نتایج: 2314073  

Journal: :CoRR 2016
Danny Dolev Eli Gafni

The theory of distributed computing, lagging in its development behind practice, has been biased in its modelling by employing mechanisms within the model mimicking reality. Reality means, processors can fail. But theory is about predicting consequences of reality, hence if we capture reality by “artificial models,” but those nevertheless make analysis simpler, we should pursue the artificial m...

Journal: :J. Inf. Sci. Eng. 2009
Hsiao-Ying Lin Wen-Guey Tzeng

In this paper we propose a new anonymous password-based authenticated key exchange protocol. The communication cost of our protocol is sub-linear ( ), O N which improves a previous one of O(N) cost, where N is the number of users in the system. We show that the session key is secure against an active adversary in the random oracle model and identity anonymity is secure against a semi-honest adv...

Journal: :مطالعات حقوق خصوصی 0
محمد طاهر کنعانی دانشگاه تهران

promise de port fort is an useful legal basic for justification many civil and commercial transactions. such as bank guaranties, insurance and guaranty of things it divides two legal relations, relation between parties if third party not ratify and relation with third party if she or he ratify that promise. unlike its appearance, it, is not violation the principle of relativity of contracts. be...

Journal: :CoRR 2017
Nilesh Chakraborty Samrat Mondal

Using password based authentication technique, a system maintains the login credentials (username, password) of the users in a password file. Once the password file is compromised, an adversary obtains both the login credentials. With the advancement of technology, even if a password is maintained in hashed format, then also the adversary can invert the hashed password to get the original one. ...

Journal: :Electr. Notes Theor. Comput. Sci. 2009
Marie Elisabeth Gaup Moe

We propose a probabilistic system model for anonymous ad hoc routing protocols that takes into account the a priori knowledge of the adversary, and illustrate how the information theoretical entropy can be used for quantification of the anonymity offered by a routing protocol as the adversary captures an increasing number of nodes in the network. The proposed measurement schema is applied to AN...

Journal: :مطالعات حقوق خصوصی 0
فرهاد ایرانپور دانشیار گروه حقوق خصوصی دانشکدۀ حقوق و علوم سیاسی دانشگاه تهران سپیده منصوری کارشناس ارشد حقوق تجاری اقتصادی بین المللی پردیس بین المللی کیش دانشگاه تهران

the principal of conformity with the law (sehat) is recognized in iranian legal system. in this article, at first we analyze this principle in respect with the iranian jurisprudence in order to demonstrate the legal evaluation. subsequently, we analyses the realistical approach of the jurist in lex mercatori in such regards with due respect to the doctrine and arbitration awards in internationa...

ژورنال: حقوق پزشکی 2009

Human Cloning phenomenon that is accounted as one of the challenges of the present century is concentrated by legal community of most of the countries. One of the prior countries that reacted against this new phenomenon and took actions in legalization is America. Considering this country’s legal system, in the present article it is tried to explain legal condition of human Cloning in the...

2006
Matthew Kerner

Use of some cryptographic protocols implies a commitment to the data operated on by those protocols. For example, a digital signature may ensure the property of nonrepudiation: the signer would be unable to claim that the signed document is a forgery. Similarly, encrypting data can form a kind of commitment to the data: the decryption process reveals the committed plaintext. In some scenarios, ...

Journal: :CoRR 2016
Alkida Balliu Gianlorenzo D'Angelo Pierre Fraigniaud Dennis Olivetti

In the framework of distributed network computing, it is known that, for every network predicate, each network configuration that satisfies this predicate can be proved using distributed certificates which can be verified locally. However, this requires to leak information about the identities of the nodes in the certificates, which might not be applicable in a context in which privacy is desir...

2000
Martín Abadi

While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the explanations are informal; others are embodied in formal methods, particularly in formal methods for the analysis of security protocols. This note (intended to accompany a talk at the Crypto 2000 conference) describes some of t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید