نتایج جستجو برای: public order
تعداد نتایج: 1258873 فیلتر نتایج به سال:
Background: In any society, values, collective and national interests have a special place. National legal systems, in the sense of public order in the nationalization of foreign investor property, support these high national values and interests against individual interests. Therefore, this research has been conducted with the aim of presenting the moral model of public order in the nationaliz...
Purpose: The present study aimed to briefly review the current status of the required spaces for the public libraries in the country and identify and redefine the architectural needs of these spaces to achieve a new pattern for contemporary libraries. Method: It is a qualitative research based on grounded theory. The data is collected using library and field methods, analytical analyses, and i...
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the message itself can be computed. The model works even if there is no prior relationship between the sender and receiver of the message. The Solar Trust Model overcomes a variety of limitations inherent in the design of other ...
The public key cryptosystems MST1 and MST2 make use of certain kinds of factorizations of finite groups. We show that generalizing such factorizations to infinite groups allows a uniform description of several proposed cryptographic primitives. In particular, a generalization of MST2 can be regarded as a unifying framework for several suggested cryptosystems including the ElGamal public key sys...
the principle of freedom of contract is conceptually narrower than the will theory and as such it does not deny the state the right to put limits on contracts between individuals. on this ground some measures have been taking to strike a balance between the interests of the consumers and the producers. among these measures are the compulsory sales to consumers in the case law and on the basis o...
The ElGamal cryptosystem is the most widely used public key cryptosystem. It uses the discrete logarithm problem as the cryptographic primitive. The MOR cryptosystem is a similar cryptosystem. It uses the discrete logarithm problem in the automorphism group as the cryptographic primitive. In this paper, we study the MOR cryptosystem for finite p-groups. The study is complete for p-automorphisms...
For a finite group G to be used in the MOR public key cryptosystem, it is necessary that the discrete logarithm problem(DLP) over the inner automorphism group Inn(G) of G must be computationally hard to solve. In this paper, under the assumption that the special conjugacy problem of G is easy, we show that the complexity of the MOR system over G is about log |G| times larger than that of DLP ov...
In order to protect a cryptographic algorithm against Power Analysis attacks, a well-known method consists in hiding all the internal data with randomly chosen masks. Following this idea, an AES implementation can be protected against Differential Power Analysis (DPA) by the “Transformed Masking Method”, proposed by Akkar and Giraud at CHES’2001, requiring two distinct masks. At CHES’2002, Tric...
Cohabitation has become so prevalent in Canada that it is now the most common mode of entry into conjugality. Yet in drawing comparisons across Canadian provinces, cohabitation is far more prevalent in the province of Quebec than elsewhere. With this in mind, the purpose of the current paper is three fold. First, we set out to briefly situate the recent growth in the number of common-law unions...
A secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/ asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the data. Trust is based on the first visual contact between users. Our proposal is a complete self-configured secure protocol that is able to create the network...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید