نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

this thesis basically deals with the well-known notion of the bear-invariant of groups, which is the generalization of the schur multiplier of groups. in chapter two, section 2.1, we present an explicit formula for the bear-invariant of a direct product of cyclic groups with respect to nc, c>1. also in section 2.2, we caculate the baer-invatiant of a nilpotent product of cyclic groups wuth resp...

2014
Andrew W. Appel

Separation logic is the twenty-first-century variant of Hoare logic that permits verification of pointer-manipulating programs. This book covers practical and theoretical aspects of separation logic at a level accessible to beginning graduate students interested in software verification. On the practical side it offers an introduction to verification in Hoare and separation logics, simple case ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1393

the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...

Journal: :The Computer Journal 2021

Abstract Verifiable symmetric searchable encryption is a keyword search technology that supports verification of results. Many schemes improve performance by dividing each label into segments and storing them in Trie-tree at the expense high storage. And index will degenerate linear linked list when all labels have same prefix except for last segment. But it greatly affect efficiency. In this p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و زبانهای خارجی 1389

according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...

Journal: :IEEE Security & Privacy 2017

Journal: :CoRR 2011
Prashant Kushwah Sunder Lal

Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step. In conventional signcryption only receiver of the signcrypted text can verify the authenticity of the origin i.e. signature of the sender on the message after decrypting the cipher text. In public verifiable signcryption scheme anyone can verify the authenticity of the origin who can acce...

2014
Giulia Alberini Tal Moran Alon Rosen

We introduce a new framework for polling responses from a large population. Our framework allows gathering information without violating the responders’ anonymity and at the same time enables public verification of the poll’s result. In contrast to prior approaches to the problem, we do not require trusting the pollster for faithfully announcing the poll’s results, nor do we rely on strong iden...

پایان نامه :0 1392

nowadays in trade and economic issues, prediction is proposed as the most important branch of science. existence of effective variables, caused various sectors of the economic and business executives to prefer having mechanisms which can be used in their decisions. in recent years, several advances have led to various challenges in the science of forecasting. economical managers in various fi...

Journal: :CoRR 2012
Justin Thaler Mike Roberts Michael Mitzenmacher Hanspeter Pfister

As the cloud computing paradigm has gained prominence, the need for verifiable computation has grown increasingly urgent. Protocols for verifiable computation enable a weak client to outsource difficult computations to a powerful, but untrusted server, in a way that provides the client with a guarantee that the server performed the requested computations correctly. By design, these protocols im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید