نتایج جستجو برای: spending
تعداد نتایج: 16337 فیلتر نتایج به سال:
We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreedupon public condition. Payers are able to remunerate payees for services that depend on future, yet to be determined outcomes of events. Moreover, payees are able to further transfer payments to third parties. Once payment complete, any double-spending...
This paper aims to investigate the effect of budget deficit shock on government spending in Indonesia. For this propose, this reasearch uses an alternative error correction model based on loss function of government spending. The model assumes the short run disequilibrium, in which shock variables may play an important role. A spesific loss function model is applied to develop the long run gove...
We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek penalties. The agent migration protocol is offline (non-centralized). The itinerary of an agent is privacy-protected. Our scheme is based on Wong’s transferable extension [Won01] of Ferguson’s single-term offline untr...
RDV: Register, Deposit, Vote: a full decentralized consensus algorithm for blockchain based networks
A decentralized payment system is not secure if transactions are transferred directly between clients. In such a situation it is not possible to prevent a client from redeeming some coins twice in separate transactions that means a double-spending attack. Bitcoin uses a simple method to preventing this attack i.e. all transactions are published in a unique log (blockchain) [17,38]. This approac...
Recently, Baseri et al. proposed a secure untraceable off-line electronic cash system. They claimed that their scheme could achieve security requirements of an e-cash system such as, untraceability, anonymity, unlinkability, double spending checking, un-forgeability, date-attachability, and prevent forging coins. They further prove the un-forgeability security feature by using the hardness of d...
OBJECTIVE To examine whether greater state-level spending on social and public health services such as income, education and public safety is associated with lower rates of teenage births in USA. DESIGN Ecological study. SETTING USA. PARTICIPANTS 50 states. PRIMARY OUTCOME MEASURE Our primary outcome measure was teenage birth rates. For analyses, we constructed marginal models using rep...
We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (e.g., in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several ...
Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking"
Recently, Fan et al. proposed a user efficient recoverable off-line e-cash scheme with fast anonymity revoking. They claimed that their scheme could achieve security requirements of an e-cash system such as, anonymity, unlinkability, double spending checking, anonymity control, and rapid anonymity revoking on double spending. They further formally prove the unlinkability and the un-forgeability...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید