نتایج جستجو برای: government protocol
تعداد نتایج: 377577 فیلتر نتایج به سال:
We propose distributed protocol for generation of random numbers via computer systems. The protocol is specifically designed to fit the needs of random selection as it is performed in public sphere and is inspired by real problems, which are posing difficulties for Bulgarian judicial system. Random selection in public sphere is meant to be mechanism for increasing the transparency and reducing ...
E-Government idea includes fast and improved citizen service from a quantitative and qualitative point of view, as well as the restructuring and reengineering of the providing organization and its services, through the increased usage and exploitation of the capabilities of the information and communication technologies and especially through the facilities and services of the Internet. The esc...
In their final section, Eller and Gerber note that the field of public policy “has perhaps paid insufficient attention” to the “remarkably fecund issue area” of counterterrorism policy, and they further suggest that explorations in this area provide not only “substantive benefit” but also “theoretic development” (p. 36). I couldn’t agree more, except that I would drop the word “perhaps.” In the...
Protocols for intelligent agents are difficult to write. This is partially because intelligent agents accommodate their interaction to the situation that arises. As a result, the interaction among intelligent agents cannot be governed by a fixed protocol. In this paper I describe an open protocol paradigm for reasoning in a multi-agent system with decentralized control. An open protocol is a co...
Security is a major cost driver in military systems and is of particular concern when using commercial network protocols in the military environment. MLS systems may be employed to reduce the amount of application software that must be secured and certified at the highest level, avoiding the expense and complexity associated with maintaining the entire system at the highest level of security. T...
In Bangladesh women’s involvement in ICT industries and ICT based government and non-government organizations changes the behavioral aspect of women’s lifestyle and thereby affects the society as a whole. In this paper we study which social issues are influenced by the involvement of women’s in ICT. We introduce a protocol for the development of women’s informatization indicator, which refers t...
In this paper we present a cryptographic protocol which is the realization of an electronic auction being the component of the e-government system. This cryptographic protocol fulfils all the functions of the classic auction and additionally, by use of cryptographic primitives, enhances the protection of information. The characteristic features of the protocol are: the incontrovertibility of pa...
In the late 1990s, the European Left seemed to be once more in the ascendancy with Social Democratic-led governments in power in the majority of EU countries, including the United Kingdom, France, and Germany. At the same time, the debate about the socalled ‘Third Way’ — as an icon of the apparent electoral revitalization of European Social Democracy — rose to become the most important reform d...
How can government agencies acquire actionable, useful information about legitimate targets, while preserving the privacy of innocent parties and holding government agencies accountable? Towards understanding this crucial issue, we present the first privacy-preserving protocol for contact chaining, an operation that law-enforcement and intelligence agencies have used effectively. Our experiment...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید