نتایج جستجو برای: public good

تعداد نتایج: 781063  

Journal: :Experimental Economics 2022

Abstract Extensive experimental research on public good games documents that many subjects are “conditional cooperators” in they positively correlate their contribution with (their belief about) contributions of other peer group. The goal our study is to shed light what preference and decision-making patterns drive this observed regularity. We consider reciprocity, conformity, inequality aversi...

Journal: :مدیریت فناوری اطلاعات 0
سیدمحمد مقیمی دانشیار دانشکده مدیریت دانشگاه تهران، ایران مصطفی اعلایی کارشناس ارشد مدیریت منابع انسانی- دانشگاه تهران، ایران

good governance is a term indicating the change of paradigm of state and government roles which prepares the way for equal participation for all citizens in decision making process, revealing this reality that governance belongs to public and is organized by them. on the other hand, e-government is a powerful instrument which causes the better public service, decrease of waste time, improvement...

2005
Josh Karlin Stephanie Forrest Jennifer Rexford

The Border Gateway Protocol (BGP), the Internet’s interdomain routing protocol, is vulnerable to a number of damaging attacks. Proposed solutions either (i) rely on a public-key infrastructure and accurate routing registries or (ii) detect attacks only after they have spread throughout the network. However, BGP routers could avoid selecting and propagating malicious routes if they were cautious...

Journal: :CoRR 2003
Shinji Yamane Jiahong Wang Hironobu Suzuki Norihisa Segawa Yuko Murayama

OpenPGP, an IETF Proposed Standard based on PGP R © application, has its own Public Key Infrastructure (PKI) architecture which is different from the one based on X.509, another standard from ITU. This paper describes the OpenPGP PKI; the historical perspective as well as its current use. We also compare three PKI technologies standardized by IETF: OpenPGP, PKIX(X.509), and SPKI/SDSI. Since the...

2014
Mark Ryan

The certificate authority model for authenticating public keys of websites has been attacked in recent years, and several proposals have been made to reinforce it. We develop and extend certificate transparency, a proposal in this direction, so that it efficiently handles certificate revocation. We show how this extension can be used to build a secure end-to-end email or messaging system using ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید