نتایج جستجو برای: third party

تعداد نتایج: 267981  

2005
Guilin Wang Feng Bao Kenji Imamoto Kouichi Sakurai

As a value-added service for standard email systems, a certified email scheme allows a sender to deliver a message to a receiver in a fair way in the sense that either the sender obtains a receipt from the receiver and the receiver accesses the content of the email simultaneously, or neither party gets the expected item. In this paper, we first point out some weaknesses in several existing sche...

Journal: :CoRR 2017
Xavier Carpent Norrathep Rattanavipanon Gene Tsudik

Remote attestation (RA) is a popular means of detecting malware in embedded and IoT devices. RA is usually realized as an interactive protocol, whereby a trusted party – verifier – measures integrity of a potentially compromised remote device – prover. Early work focused on purely softwarebased and fully hardware-based techniques, neither of which is ideal for low-end devices. More recent resul...

2001
Agathe Merceron

The actual trend in the transport industry is to have electronic systems without mechanical back-up, so-called ”bywire” systems. Micro-computers control steering, brakes, power train etc... Robust protocols are needed to make these micro-computers communicate. They should be faulttolerant and yet not let the micro-computers split into disjoint communicating subsets. TTP is a time-triggered prot...

2008
Eli Diamond Jacqueline Lagrée

Spinoza’s Tractatus Theologico-Politicus (TTP) is one of the first and most important theoretical justifications of the separation of religion from philosophy and from politics. The separation of church and state and the separation of theology from other scientific disciplines are of course defining moments of contemporary secularity. While it can easily appear from certain religiously conserva...

1995
Thomas Mannel

Recent progress in the theoretical description of inclusive heavy flavour decays is reviewed. After an outline of the theoretical methods applications to total decay rates and semileptonic decay spectra are presented. Contribution to the workshop on “Heavy Quark Physics”, December 13 – 16, 1994, Bad Honnef, Germany. TTP 95–06 March 1995

2001
Min-Shiang Hwang Chin-Chen Chang Kuo-Feng Hwang Shieh-Yang-Sun’s Proto

This letter presents a secure authentication protocol which supports both the privacy of messages and the authenticity of the communicating parties. A scheme for extending a secure authentication protocol to improve the security of the communicating parties is also proposed.

2008
Wiebren de Jonge Bart Jacobs

This paper introduces a novel approach or architecture for fraud-resistant and privacy-friendly Electronic Traffic Pricing (ETP). One salient contribution is that it can satisfy the seemingly incompatible requirements of a privacy-friendly and socalled “thin” solution. The proposed approach relies on regularly sending to the traffic Pricing Authority (PA) only hashes of travelled trajectories a...

2004
Radu Jurca Boi Faltings

Reputation mechanisms provide a promising alternative to the traditional security methods for preventing malicious behavior in online transactions. However, obtaining correct reputation information is not trivial. In the absence of objective authorities (or trusted third parties) which can oversee every transaction, mechanism designers have to ensure that it is rational for the participating pa...

1995
Aviel D. Rubin

This paper ooers a solution to a problem of software distribution on the Internet. The problem is that malicious software can be posted to the public with no accountability. When this software is run, it inherits the privileges of the user who runs it. Unfortunately, it is very common for users to execute software obtained on the Internet with no assurance that it is genuine. The solution ooere...

2009
Jan Camenisch Gregory M. Zaverucha

This paper introduces certified sets to the private set intersection problem. A private set intersection protocol allows Alice and Bob to jointly compute the set intersection function without revealing their input sets. Since the inputs are private, malicious participants may choose their sets arbitrarily and may use this flexibility to affect the result or learn more about the input of an hone...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید