نتایج جستجو برای: third parties
تعداد نتایج: 269630 فیلتر نتایج به سال:
A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. Many threshold cryptographic schemes have been proposed so far, but fairness is not generally considered in this earlier work. In this paper, we present fair threshold decryption schemes, where either al...
BY THIRD PARTIES (NON-PARENTS) Ronald W. Nelson Rose & Nelson Overland Park, Kansas
The enterprise software industry faces dynamic market environments. Customers are unpredictable, and many different factors influence a sale. Software as such is frequently perceived as being a sort of 'black box'. In this paper we examine the different factors that influence new product adoption and diffusion in the enterprise software market, where we especially look at the role of third part...
The mobile agent paradigm gains ever more acceptance for the creation of distributed applications particularly in the domain of electronic commerce In such applications a mobile agent roams the global Internet in search of services for its owner One of the problems with this approach is that malicious service providers on the agent s itinerary can access con dential information contained in the...
Reducing Third Parties in the Network through Client-Side Intelligence
BACKGROUND Research on organizational injustice has mainly focused on the victim's perspective. This study attempts to contribute to our understanding of third parties' perspective by empirically testing a model that describes third party reactions to mistreatment of employees. METHOD Data were obtained from a sample (N = 334) of Spanish employees from various organizations, nested into 66 wo...
* PD Dr. iur. (Fribourg/Switzerland), LL.M. (Frankfurt a.M.), attorney-at-law (Zurich), [email protected]. This research has been presented at the Second Max Planck PostDoc-Conference on European Private Law. I would like to thank Professor Pascal Pichonnaz (Fribourg, Switzerland) for supporting my application to the conference. Furthermore, I would like to thank all participants of the conferenc...
Introduction .............................................................................................................. 3 Table 1: Petition for Right of Visitation with Minor Child. Order for Payment of Fees. ....... 4 Section 1: Visitation with Grandchildren ........................................................................ 6 Table 2: Troxel vs. Granville ...............................
Third political parties are influential in shaping American politics. In this work we study the spread of third parties ideologies in a voting population where we assume that party members are more influential in recruiting new third party voters than non-member third party voters. The study is conducted using an epidemiological model with nonlinear ordinary differential equations as applied to...
With the increasing personalization of the Web, many websites allow users to create their own personal accounts. This has resulted in Web users often having many accounts on different websites, to which they need to authenticate in order to gain access. Unfortunately, there are several security problems connected to the use and re-use of passwords, the most prevalent authentication method curre...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید