نتایج جستجو برای: evident
تعداد نتایج: 63677 فیلتر نتایج به سال:
Restaurant-to-consumer food delivery has experienced disruption with the growth of third-party services such as DoorDash and Uber Eats. However, this platform-to-consumer method introduces increased opportunities for tampering contamination due to additional touchpoints in process. To mitigate these concerns, more restaurants are implementing tamper-evident closures seals attached containers us...
In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic operations. We relax the security properties usually required from locked boxes (such as in bit-commitment protocols) and require only that a broken lock or torn envelope be identifiable to the original sender. Unlike the complete...
When cognitive processes occur alongside observable actions, it is possible for characteristics of these processes to influence the ongoing performance of those actions. This satisfies everyday intuitions. For example, negotiators and poker players claim to be attuned to ‘tells,’ these early behavioral indicators of eventual decisions. Going beyond intuitions, however, several researchers have ...
The availability of low-cost cigarettes undermines tobacco control’s most effective measure to reduce smoking prevalence: keeping cigarette prices high by raising tobacco taxes.1 The discount cigarette market share has grown considerably since 2003,2 with discount cigarettes selling for $10-$15 less per carton than premium brands. Contraband cigarettes – cigarettes sold illegally – are even che...
Electroconvulsive therapy (ECT) is regarded as one of the most effective treatments for major depressive disorder but has also been associated with cognitive deficits possibly reflecting brain damage. The aim of this study was therefore to evaluate whether ECT induces cerebral damage as reflected by different biochemical measures. The concentrations in the cerebrospinal fluid (CSF) of three est...
We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a se...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید