نتایج جستجو برای: third parties

تعداد نتایج: 269630  

2009
Jeongdae Hong Jinil Kim Jihye Kim Matthew K. Franklin Kunsoo Park

A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. Many threshold cryptographic schemes have been proposed so far, but fairness is not generally considered in this earlier work. In this paper, we present fair threshold decryption schemes, where either al...

2011
Ronald W. Nelson

BY THIRD PARTIES (NON-PARENTS) Ronald W. Nelson Rose & Nelson Overland Park, Kansas

2003
Hans M. Moonen

The enterprise software industry faces dynamic market environments. Customers are unpredictable, and many different factors influence a sale. Software as such is frequently perceived as being a sort of 'black box'. In this paper we examine the different factors that influence new product adoption and diffusion in the enterprise software market, where we especially look at the role of third part...

1999
Uwe G. Wilhelm Sebastian Staamann Levente Buttyán

The mobile agent paradigm gains ever more acceptance for the creation of distributed applications particularly in the domain of electronic commerce In such applications a mobile agent roams the global Internet in search of services for its owner One of the problems with this approach is that malicious service providers on the agent s itinerary can access con dential information contained in the...

2017
Georgios Kontaxis

Reducing Third Parties in the Network through Client-Side Intelligence

Journal: :Psicothema 2013
Gabriela Topa Juan A Moriano José F Morales

BACKGROUND Research on organizational injustice has mainly focused on the victim's perspective. This study attempts to contribute to our understanding of third parties' perspective by empirically testing a model that describes third party reactions to mistreatment of employees. METHOD Data were obtained from a sample (N = 334) of Spanish employees from various organizations, nested into 66 wo...

2009
Andreas Abegg

* PD Dr. iur. (Fribourg/Switzerland), LL.M. (Frankfurt a.M.), attorney-at-law (Zurich), [email protected]. This research has been presented at the Second Max Planck PostDoc-Conference on European Private Law. I would like to thank Professor Pascal Pichonnaz (Fribourg, Switzerland) for supporting my application to the conference. Furthermore, I would like to thank all participants of the conferenc...

2016

Introduction .............................................................................................................. 3 Table 1: Petition for Right of Visitation with Minor Child. Order for Payment of Fees. ....... 4 Section 1: Visitation with Grandchildren ........................................................................ 6 Table 2: Troxel vs. Granville ...............................

2005
Daniel M. Romero Christopher M. Kribs-Zaleta Anuj Mubayi Clara Orbe

Third political parties are influential in shaping American politics. In this work we study the spread of third parties ideologies in a voting population where we assume that party members are more influential in recruiting new third party voters than non-member third party voters. The study is conducted using an epidemiological model with nonlinear ordinary differential equations as applied to...

2016
Anna Vapen

With the increasing personalization of the Web, many websites allow users to create their own personal accounts. This has resulted in Web users often having many accounts on different websites, to which they need to authenticate in order to gain access. Unfortunately, there are several security problems connected to the use and re-use of passwords, the most prevalent authentication method curre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید