نتایج جستجو برای: third party
تعداد نتایج: 267981 فیلتر نتایج به سال:
As a value-added service for standard email systems, a certified email scheme allows a sender to deliver a message to a receiver in a fair way in the sense that either the sender obtains a receipt from the receiver and the receiver accesses the content of the email simultaneously, or neither party gets the expected item. In this paper, we first point out some weaknesses in several existing sche...
Remote attestation (RA) is a popular means of detecting malware in embedded and IoT devices. RA is usually realized as an interactive protocol, whereby a trusted party – verifier – measures integrity of a potentially compromised remote device – prover. Early work focused on purely softwarebased and fully hardware-based techniques, neither of which is ideal for low-end devices. More recent resul...
The actual trend in the transport industry is to have electronic systems without mechanical back-up, so-called ”bywire” systems. Micro-computers control steering, brakes, power train etc... Robust protocols are needed to make these micro-computers communicate. They should be faulttolerant and yet not let the micro-computers split into disjoint communicating subsets. TTP is a time-triggered prot...
Spinoza’s Tractatus Theologico-Politicus (TTP) is one of the first and most important theoretical justifications of the separation of religion from philosophy and from politics. The separation of church and state and the separation of theology from other scientific disciplines are of course defining moments of contemporary secularity. While it can easily appear from certain religiously conserva...
Recent progress in the theoretical description of inclusive heavy flavour decays is reviewed. After an outline of the theoretical methods applications to total decay rates and semileptonic decay spectra are presented. Contribution to the workshop on “Heavy Quark Physics”, December 13 – 16, 1994, Bad Honnef, Germany. TTP 95–06 March 1995
This letter presents a secure authentication protocol which supports both the privacy of messages and the authenticity of the communicating parties. A scheme for extending a secure authentication protocol to improve the security of the communicating parties is also proposed.
This paper introduces a novel approach or architecture for fraud-resistant and privacy-friendly Electronic Traffic Pricing (ETP). One salient contribution is that it can satisfy the seemingly incompatible requirements of a privacy-friendly and socalled “thin” solution. The proposed approach relies on regularly sending to the traffic Pricing Authority (PA) only hashes of travelled trajectories a...
Reputation mechanisms provide a promising alternative to the traditional security methods for preventing malicious behavior in online transactions. However, obtaining correct reputation information is not trivial. In the absence of objective authorities (or trusted third parties) which can oversee every transaction, mechanism designers have to ensure that it is rational for the participating pa...
This paper ooers a solution to a problem of software distribution on the Internet. The problem is that malicious software can be posted to the public with no accountability. When this software is run, it inherits the privileges of the user who runs it. Unfortunately, it is very common for users to execute software obtained on the Internet with no assurance that it is genuine. The solution ooere...
This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersection function without revealing their input sets. Since the inputs are private, malicious participants may choose their sets arbitrarily and may use this flexibility to affect the result or learn more about the input of an hone...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید