نتایج جستجو برای: third parties

تعداد نتایج: 269630  

Journal: :CoRR 2010
Rashid Sheikh Beerendra Kumar Durgesh Kumar Mishra

Secure sum computation of private data inputs is an important component of Secure Multi-party Computation (SMC).In this paper we provide a protocol to compute the sum of individual data inputs with zero probability of data leakage. In our proposed protocol we break input of each party into number of segments and change the arrangement of the parties such that in each round of the computation th...

2004
MARTIN BROWN ARMIN FALK ERNST FEHR E. FEHR

We provide evidence that long-term relationships between trading parties emerge endogenously in the absence of third party enforcement of contracts and are associated with a fundamental change in the nature of market interactions. Without third party enforcement, the vast majority of trades are initiated with private offers and the parties share the gains from trade equally. Low effort or bad q...

2013
Alex K. Chavez Cristina Bicchieri

We measured the beliefs and behavior of third parties who were given the opportunity to add to or deduct from the payoffs of individuals who engaged in an economic bargaining game under different social contexts. Third parties rewarded bargaining outcomes that were equal and compensated victims of unfair bargaining outcomes rather than punishing perpetrators, but were willing to punish when com...

2017
Gary Jonas Fooks Julia Smith Kelley Lee Chris Holden

BACKGROUND The World Health Organization (WHO) Framework Convention on Tobacco Control (FCTC) stands to significantly reduce tobacco-related mortality by accelerating the introduction of evidence-based tobacco control measures. However, the extent to which States Parties have implemented the Convention varies considerably. Article 5.3 of the FCTC, is intended to insulate policy-making from the ...

2010
Clark Douglas Asay

Under the current US regime, consumers have inadequate knowledge and control regarding how companies disclose their personal information to third parties. Consisting of industry-specific and state laws, ad hoc FTC enforcement, and self-regulation, this piecemeal approach to privacy leaves consumers in most cases with little actual knowledge about who will receive their information and how they ...

Journal: :CoRR 2018
Nahid Yahyapoor Hamed Yaghoobian Manijeh Keshtgari

Secure communication is a matter of genuine concern that includes means whereby entities can share information without a third party’s interception. Key agreement protocols are one of the common approaches in which two or more parties can agree upon a key, which precludes undesired third parties from forcing a key choice on them. Over the past decade, chaos-based key agreement protocols have be...

2011
Reza Rawassizadeh Johannes Heurix Soheil Khosravipour A Min Tjoa

Sharing personal information benefits both users and third parties in many ways. Recent advances in sensor networks and personal archives enable users to record all of their digital objects including emails, social networking activities, or life events (life logging). These information objects are usually privacy sensitive and thus need to be protected adequately when being shared. In this work...

2013
Shailaja B. Jadhav Prachi Joshi

While doing business, there are situations when some important information or data should be handed over to some third parties. The data important to organization must be secured but the third parties are not that careful about the data. So there is possibility that the data gets leaked. Here in this paper we are considering the chances that the third party is responsible for the leakage. We pr...

Journal: :Seizure 2012
Catherine Robson Paul Drew Traci Walker Markus Reuber

PURPOSE To extend our previous research demonstrating that linguistic/interactional features in patients' talk can assist the challenging differential diagnosis of epilepsy and psychogenic nonepileptic seizures (PNES) by exploring the differential diagnostic potential of references to non co-present persons (third parties). METHOD Initial encounters were recorded between 20 seizure patients (...

Journal: :The journal of the American Academy of Psychiatry and the Law 2011
Wendy J Murphy

The past 20 years of criminal law and practice have produced much heat but little light on the issue of when, if ever, the accused in a criminal case can legitimately seek disclosure of a victim's privileged files that exist exclusively in the custody of a private third party. In many jurisdictions, forced disclosure is routine, and victims must choose between justice and privacy, resulting in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید