نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

پایان نامه :0 1374

this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...

2004
Gildas Avoine Serge Vaudenay

In this paper we propose an optimistic two-party fair exchange protocol which does not rely on a centralized trusted third party. Instead, the fairness of the protocol relies on the honesty of part of the neighbor participants. This new concept, which is based on a generic verifiable secret sharing scheme, is particularly relevant in networks where centralized authority can neither be used on-l...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1390

abstract al- muntazam by ibn al -jawzi is one of the greatest the book ancient book of texts on history of islam in the 6th century.it is very important one;because of including rare reports which are not found any where.in addition to historical reports,his outlook , in which embodies information on mythologies, milal wa nihal (sects and creeds), geography, and political, social and religiou...

Journal: :IACR Cryptology ePrint Archive 2004
Chunming Tang Dingyi Pei Zhuojun Liu Yong He

A publicly verifiable secret sharing scheme is more applicable than a verifiable secret sharing because of the property that the validity of the shares distributed by the dealer can be verified by any party. In this paper, we construct a non-interactive and informationtheoretic publicly verifiable secret sharing by a computationally binding and unconditionally hiding commitment scheme and zero-...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده ادبیات 1391

nothing affects learners more than assessment, so it is important to involve them in assessment process. involvment of learners in assessment helps them to become autonoumos learners. despite this importance iranian learners specialy javanroodian ones are not activily involved in the process. hence the aim of this thesis is to invesrtigate thier ability in th eassessment process

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1390

the main objective in sampling is to select a sample from a population in order to estimate some unknown population parameter, usually a total or a mean of some interesting variable. a simple way to take a sample of size n is to let all the possible samples have the same probability of being selected. this is called simple random sampling and then all units have the same probability of being ch...

2010
Andrey A. Klebanov

Model checking is a well developed verification technique still it is not widely adopted. One of the reasons is that defining formal specification is an error-prone and time-consuming task. This paper gives an overview of the ongoing research which focuses on expressing verifiable requirements in controlled natural language in the framework of automata-based programming.

Journal: :Information 2023

A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification two plaintexts without decryption was proposed in our previous paper. The main contributions study include following. (1) Certain such as one-time pad belong to VE class. (2) We constructed an authentication algorithm for unlocking local devices via a network utilizes property VE. (3) As result impl...

Journal: :J. Internet Serv. Inf. Secur. 2013
Jun Ye Xiaofeng Chen Jianfeng Ma

In information security field underlying cryptography, random sequences, which are the base of system security, play a very important role. Random sequences with high security are often needed in cryptography field. From the view of security, real random sequences should be completely unpredictable and reliable. In many circumstances, a random number not only need to be random, but also need to...

Journal: :IACR Cryptology ePrint Archive 2015
Kaoutar Elkhiyaoui Melek Önen Refik Molva

The advent of cloud computing has given rise to a plethora of work on verifiable delegation of computation. Homomorphic signatures are a powerful tool that can be tailored for verifiable computation, as long as they are efficiently verifiable. The main advantages of homomorphic signatures are twofold: (i) public verifiability: Any third party can verify the correctness of the delegated computat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید