نتایج جستجو برای: refusing to accept repudiation
تعداد نتایج: 10614899 فیلتر نتایج به سال:
Non-repudiation Protocols. During the last decade open networks, above all the Internet, have known an impressive growth. As a consequence, new security issues, like non-repudiation have to be considered. Repudiation is de ned as the denial of an entity of having participated in all or part of a communication. Consider for instance the following scenario: Alice wants to send a message to Bob; a...
Ideally, in Ad-hoc networks all comprising nodes act cooperatively in establishing the communication paths from various sources to destinations. However, in practice such an ideal situation may not always be realized. Some nodes may act selfishly, refusing to accept the burden of forwarding packets. Some other nodes may act maliciously. Either way, such nodes degrade the network reliability or ...
Non-repudiation is an aspect of security that is concerned with the creation of irrefutable audits ofan interaction. Ensuring the audit is irrefutable and verifiable by a third party is not a trivial task.A lot of supporting infrastructure is required which adds large expense to the interaction. Thisinfrastructure comprises, (i) a non-repudiation aware run-time environment, (ii) sev...
Results The screened records included 49 221 pregnant women, and 4503 husbands of the pregnant women showed positive on the screening test. Of the at-risk couples, there were 198 for α-thal (4.4%) and 83 for β-thal (1.8%), respectively. Genetic counseling was offered to all at-risk couples and a successful prenatal diagnosis was performed for 269 out of 281 (95.7%) for αor β-thal major, with th...
Mathematics is facing a dilemma at its heart: the nature of mathematical proof. We have known since Church and Turing independently showed that mathematical provability was undecidable that there are theorems whose shortest proofs are enormous. Within the last half-century we have discovered practical examples of such theorems: the classification of all finite simple groups, the Four Colour The...
We consider a population of anonymous processes communicating via anonymous message-passing, where the recipient of each message is chosen by an adversary and the sender is not identified to the recipient. Even with unbounded message sizes and process states, such a system can compute only limited predicates on inputs held by the processes. In the finite-state case, we show how the exact streng...
to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید