نتایج جستجو برای: stamping

تعداد نتایج: 1501  

2003
G. Cattaneo A. Cilardo A. Mazzeo L. Romano G. P. Saggese

This paper presents a web-based architecture for providing digital time stamping services. Time stamping services are typically divided into schemes which rely on unconditionally trusted Time Stamping Authorities (TSAs) and schemes which do not, namely the so called linking schemes. The proposed architecture relies on a multi-tier structure. The middle-tier exposes digital time stamping functio...

2005
Alexis Bonnecaze

The aim of a time-stamping system is to prove the existence of a digital document at a particular time in the past. Implemented time-stamping systems are generally based on a centralized server model. However, the unique server may represent a weakness for the system. In this paper, we propose a distributed time-stamping scheme which is more robust against a denial of service attack. Our protoc...

2013
Xiuting Zhao Li Liang Zhiwen Liu

In order to improve the utilization of materials, improving stamping cage processing methods, the single row tapered roller bearing cage is improved from structural strength, puts forward whole stamping cage a type of structure. Use ANSYS finite element analysis to the different structure and the thickness cage. Get the stress contours of the cage, based on equal strength design principles. Get...

2015
Heung-Kyu Kim Seong Hyeon Lee Hyunjoo Choi

Using an inverse analysis technique, the heat transfer coefficient on the die-workpiece contact surface of a hot stamping process was evaluated as a power law function of contact pressure. This evaluation was to determine whether the heat transfer coefficient on the contact surface could be used for finite element analysis of the entire hot stamping process. By comparing results of the finite e...

1993
Dave Bayer Stuart Haber

To establish that a document was created after a given moment in time, it is necessary to report events that could not have been predicted before they happened. To establish that a document was created before a given moment in time, it is necessary to cause an event based on the document, which can be observed by others. Cryptographic hash functions can be used both to report events succinctly,...

Journal: :I. J. Network Security 2006
Eric Jui-Lin Lu Cheng-Jian Huang

In current proxy signature schemes, an original signer delegates her signing capability to a proxy signer, and then the proxy signer can sign messages on behalf of the original signer. Although these schemes have succeeded in proxy delegations, they share a common problem. That is, a verifier cannot ascertain that a proxy signature was signed by the proxy signer during the valid delegation peri...

Journal: :Journal of virology 2009
Josep Sardanyés Ricard V Solé Santiago F Elena

Regardless of genome polarity, intermediaries of complementary sense must be synthesized and used as templates for the production of new genomic strands. Depending on whether these new genomic strands become themselves templates for producing extra antigenomic ones, thus giving rise to geometric growth, or only the firstly synthesized antigenomic strands can be used to this end, thus following ...

1998
Ahto Buldas Peeter Laud Helger Lipmaa Jan Willemson

We state the basic requirements for time-stamping systems applicable as the necessary support to the legal use of electronic documents. We analyze the main drawbacks of the time-stamping systems proposed to date and present a new system that meets all the stated requirements. We prove that these requirements cannot be signi cantly tightened.

2015
Jamie Chriqui Hillary DeLong Camille Gourdet Frank Chaloupka Sarah Matthes Edwards Xin Xu Gabbi Promoff

Tobacco use is the leading cause of preventable disease and death in the United States. Increasing the unit price on tobacco products is the most effective tobacco prevention and control measure. Illicit tobacco trade (illicit trade) undermines high tobacco prices by providing tobacco users with cheaper-priced alternatives. In the United States, illicit trade primarily occurs when cigarettes ar...

2000

One of the most promising uses of time-stamping technology lies in combining it with a public key infrastructure. A public-key infrastructure (PKI) consists of protocols, services, and standards supporting applications of public-key cryptography [1]. Public-key cryptography involves the use of a public and private key pair. Data encrypted with a public key can only be decrypted with its related...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید