نتایج جستجو برای: پروتکلهای ikp
تعداد نتایج: 203 فیلتر نتایج به سال:
A hallmark of many an intuitionistic theory is the existence property, EP, i.e., if the theory proves an existential statement then there is a provably definable witness for it. However, there are well known exceptions, for example, the full intuitionistic Zermelo-Fraenkel set theory, IZF, does not have the existence property, where IZF is formulated with Collection. By contrast, the version of...
Micro-payments are payments too small in amount to warrant the overhead costs of current nancial clearing networks. Furthermore one can expect that content servers for the global information infrastructure (GII) will have to process so many of these low value transactions that computationally complex and costly cryptographic protocols will be impractical. This report proposes a micro-payment sc...
A computationally fast inverse kinematic scheme is derived which solves robot's end-effector (EE) trajectories in terms of joint trajectories. The inverse kinematic problem (IKP) is cast as a control problem for a simple dynamic system. The resulting closed-loop algorithms are shown to guarantee satisfactory tracking performance. Differently from previous first-order schemes which only solve fo...
This paper proposes a family of protocols { iKP (i = 1; 2; 3) { for secure electronic payments over the Internet. The protocols implement credit card-based transactions between the customer and the merchant while using the existing nancial network for clearing and authorization. The protocols can be extended to apply to other payment models, such as debit cards and electronic checks. They are b...
We investigate the logical structure of intuitionistic Kripke-Platek set theory IKP , and show that first-order logic is IQC .
The SET payment protocol uses digital signatures to authenticate messages and authorize transactions. It is assumed that these digital signatures make authorizations non-repudiable, i.e., provable to a third-party veri er. This paper evaluates what can be proved with the digital signatures in SET. The analysis shows that even a successful and completed SET protocol run does not give the parties...
Man-in-the-middle attacks in TLS due to compromised CAs have been mitigated by log-based PKI enhancements such as Certificate Transparency. However, these log-based schemes do not offer sufficient incentives to logs and monitors, and do not offer any actions that domains can take in response to CA misbehavior. We propose IKP, a blockchain-based PKI enhancement that offers automatic responses to...
Institut für Kernphysik (IKP-3) and Jülich Center for Hadron Physics, Forschungszentrum Jülich, D-52425 Jülich, Germany Helmholtz-Institut für Strahlenund Kernphysik (Theorie) and Bethe Center for Theoretical Physics, Universität Bonn, D-53115 Bonn, Germany Department of Physics, North Carolina State University, Raleigh, NC 27695, USA Institute for Advanced Simulations (IAS), Forschungszentrum ...
Pelaporan Insiden Keselamatan Pasien (IKP) dapat dijadikan suatu proses pembelajaran dan mencegah terulangnya kesalahan yang pada akhirnya akan meningkatkan keselamatan pasien mutu asuhan pelayanan keperawatan di rumah sakit. Sebuah tinjauan sistematik dilakukan, bertujuan untuk mengidentifikasi faktor mempengaruhi pelaporan IKP oleh perawat Metode penelitian ini menggunakan pencarian artikel m...
GSI, Darmstadt, Germany; JLU Giessen, Germany; USP, Sao Paulo, Brazil; USC, Santiago de Compostela, Spain; INFN-Universita di Milano, Italy; University of Surrey, Guildford, UK; LNL-INFN Legnaro, Italy; Comenius University, Bratislava, Slovakia; RIKEN Nishina Center, Wako, Japan; MPI-K, Heidelberg, Germany; IKP, Köln, Germany; IEP, Warsaw, Poland; Beijing University, China; Osaka University, Ja...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید