نتایج جستجو برای: jehovahs witness
تعداد نتایج: 6845 فیلتر نتایج به سال:
This study examined whether or not exposing an eyewitness to a co-witness statement that incorrectly blames an innocent bystander for a crime can increase the likelihood of the eyewitness subsequently blaming the innocent bystander for the crime. It also examined whether or not the perceived age of the co-witness influences this effect. Participant eyewitnesses first watched a video of a crime ...
Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction provided that the witness is valid for a given statement and additionally the witness does not belong to a set of eliminated witnesses. This set is determined by a public relation Q (that parameterizes the primitive) and the private...
We propose a new time-release protocol based on the bitcoin protocol and witness encryption. We derive a “public key” from the bitcoin block chain for encryption. The decryption key are the unpredictable information in the future blocks (e.g., transactions, nonces) that will be computed by the bitcoin network. We build this protocol by witness encryption and encrypt with the bitcoin proof-of-wo...
Introduction: This study was aimed to compare of the effectiveness of group cognitive-behavioral therapy and methadone maintenance therapy on changing beliefs toward substance abuse among addicted people. Method: The research method was a quasi-experimental pretest-posttest with witness group. 30 addicted people who were referred to the addiction treatment centers selected by available sampling...
In ways analogous to humans, autonomous agents require trust and reputation concepts in order to identify communities of agents with which to interact reliably. This paper defines a class of attacks called witness-based collusion attacks designed to exploit trust and reputation models. Empirical results demonstrate that unidimensional trust models are vulnerable to witness-based collusion attac...
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership of the element. Typically, the membership witness has to be synchronized with the accumulator value: it has to be updated every time another e...
The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method R...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید