نتایج جستجو برای: government protocol

تعداد نتایج: 377577  

Journal: :British journal for the history of science 1999
J Gascoigne

The Royal Society took as one of its patron saints Francis Bacon, who envisaged the great calling of science as acting as a means of effecting ‘ the relief of man’s estate ’ through a partnership between philosophers and politicians. The object of this paper is to examine the extent to which this goal was realized from the time of the Society’s foundation until the end of the eighteenth century...

2005
A. S. DRIGAS L. KOUKIANAKIS S. DOMOXOUDIS

E-government is the challenge for European Governments, to simplify, accelerate and improve, the delivery of the governmental circle services and facilities to the citizen. According to Lisbon’s Ministerial Meeting, EU group of policies and initiatives, known as E-Europe, among other policies and priorities for the Information Society, gives emphasis on Government online: ensures that citizens ...

2008
Thomas J. Sargent Bruce D. Smith

Abstract: A standard timing protocol allows in a cash-in-advance model allows the government to elude the inflation tax. That matters. Altering the timing of tax collections to make the government hold cash overnight disables some classical propositions but enables others. The altered timing protocol loses a Ricardian proposition and also the proposition that open market operations, accompanied...

2013
Klaus John Stefan Taber Andreas Ehringfeld

This paper illustrates the development of an e-government solution for an application of a single-sign-on technology without the use of the SAML V2.0 protocol. We were confronted with the task of creating and implementing this kind of secure system, running on myHelp.gv.at, which is one of the Austrian eGovernment Portals. The solution – or as we call it ‘proxy authenticator’ – enables us to om...

2014
Ang Yang Junghyun Nam Moonseong Kim Kim-Kwang Raymond Choo

We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the ...

2011
Kristian Gjøsteen

The Norwegian government ran a trial of internet remote voting during the 2011 local government elections, and will run another trial during the 2013 parliamentary elections. A new cryptographic voting protocol will be used, where so-called return codes allow voters to verify that their ballots will be counted as cast. This paper discusses this cryptographic protocol, and in particular the ball...

Journal: :international journal of reproductive biomedicine 0
ensieh shahrokh tehrani nejad behnaz attar shakeri batool hoseini rashidi fatemeh ramezanzade mamak shariat

background: recently different studies suggested that discontinuation of gonadotrophin releasing hormone analogue (gnrha) at beginning of ovarian stimulation (improvement of ovarian response to gonadotrophins) may have some benefit to poor responder patients in invitro fertilization (ivf) cycles. objective:the efficacy of gnrha stop protocol in poor responder patients in ivf cycles was assessed...

Journal: :journal of family and reproductive health 0
batool hossein rashidi reproductive health research center, tehran university of medical sciences, tehran, iran tahereh behrouzi lak reproductive health research center, department of infertility, urmia university of medical sciences, urmia, iran ensiyeh shahrokh tehrani reproductive health research center, tehran university of medical sciences, tehran, iran fatemeh davari tanha department of obstetrics and gynecology, mohebeyas hospital, tehran university of medical sciences, tehran, iran

objective: this study was conducted to compare the results of fixed versus flexible gnrh antagonist protocols in controlled ovarian stimulation for intra cytoplasmic sperm injection (icsi) in patients with pcos. materials and methods: a randomized clinical trial was performed on 100 pcos women, who were admitted to a tertiary infertility clinic and were candidate for ivf/icsi. they were divided...

Journal: :IACR Cryptology ePrint Archive 2014
Zhengjun Cao Lihua Liu

We remark that the Bellare-Rivest protocol for translucent cryptography [J. Cryptology (1999) 12: 117-139] can not truly enable the government to decrypt partial encrypted communications.

Kidney transplantation in patients with end stage renal disease is preferred to dialysis because transplantation provides a better quality of life andimproved survival. However, the gap between the supply and demand for a renal allograft is widening and the waiting time is increasing. Iranian protocol, a controlled transplant program supported by the government for living unrelated donors, was ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید