نتایج جستجو برای: government protocol
تعداد نتایج: 377577 فیلتر نتایج به سال:
The Royal Society took as one of its patron saints Francis Bacon, who envisaged the great calling of science as acting as a means of effecting ‘ the relief of man’s estate ’ through a partnership between philosophers and politicians. The object of this paper is to examine the extent to which this goal was realized from the time of the Society’s foundation until the end of the eighteenth century...
E-government is the challenge for European Governments, to simplify, accelerate and improve, the delivery of the governmental circle services and facilities to the citizen. According to Lisbon’s Ministerial Meeting, EU group of policies and initiatives, known as E-Europe, among other policies and priorities for the Information Society, gives emphasis on Government online: ensures that citizens ...
Abstract: A standard timing protocol allows in a cash-in-advance model allows the government to elude the inflation tax. That matters. Altering the timing of tax collections to make the government hold cash overnight disables some classical propositions but enables others. The altered timing protocol loses a Ricardian proposition and also the proposition that open market operations, accompanied...
This paper illustrates the development of an e-government solution for an application of a single-sign-on technology without the use of the SAML V2.0 protocol. We were confronted with the task of creating and implementing this kind of secure system, running on myHelp.gv.at, which is one of the Austrian eGovernment Portals. The solution – or as we call it ‘proxy authenticator’ – enables us to om...
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the ...
The Norwegian government ran a trial of internet remote voting during the 2011 local government elections, and will run another trial during the 2013 parliamentary elections. A new cryptographic voting protocol will be used, where so-called return codes allow voters to verify that their ballots will be counted as cast. This paper discusses this cryptographic protocol, and in particular the ball...
background: recently different studies suggested that discontinuation of gonadotrophin releasing hormone analogue (gnrha) at beginning of ovarian stimulation (improvement of ovarian response to gonadotrophins) may have some benefit to poor responder patients in invitro fertilization (ivf) cycles. objective:the efficacy of gnrha stop protocol in poor responder patients in ivf cycles was assessed...
objective: this study was conducted to compare the results of fixed versus flexible gnrh antagonist protocols in controlled ovarian stimulation for intra cytoplasmic sperm injection (icsi) in patients with pcos. materials and methods: a randomized clinical trial was performed on 100 pcos women, who were admitted to a tertiary infertility clinic and were candidate for ivf/icsi. they were divided...
We remark that the Bellare-Rivest protocol for translucent cryptography [J. Cryptology (1999) 12: 117-139] can not truly enable the government to decrypt partial encrypted communications.
Kidney transplantation in patients with end stage renal disease is preferred to dialysis because transplantation provides a better quality of life andimproved survival. However, the gap between the supply and demand for a renal allograft is widening and the waiting time is increasing. Iranian protocol, a controlled transplant program supported by the government for living unrelated donors, was ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید