نتایج جستجو برای: jehovahs witness

تعداد نتایج: 6845  

2015
Craig Thorley Ken Lukowiak

This study examined whether or not exposing an eyewitness to a co-witness statement that incorrectly blames an innocent bystander for a crime can increase the likelihood of the eyewitness subsequently blaming the innocent bystander for the crime. It also examined whether or not the perceived age of the co-witness influences this effect. Participant eyewitnesses first watched a video of a crime ...

2009
Aggelos Kiayias Hong-Sheng Zhou

Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction provided that the witness is valid for a given statement and additionally the witness does not belong to a set of eliminated witnesses. This set is determined by a public relation Q (that parameterizes the primitive) and the private...

2015
Jia Liu Flavio Garcia Mark Ryan

We propose a new time-release protocol based on the bitcoin protocol and witness encryption. We derive a “public key” from the bitcoin block chain for encryption. The decryption key are the unpredictable information in the future blocks (e.g., transactions, nonces) that will be computed by the bitcoin network. We build this protocol by witness encryption and encrypt with the bitcoin proof-of-wo...

Journal: :The American Journal of the Medical Sciences 1843

ژورنال: اعتیاد پژوهی 2012
صرامی , غلامرضا , قربانی, طاهره , محمدخانی, شهرام ,

Introduction: This study was aimed to compare of the effectiveness of group cognitive-behavioral therapy and methadone maintenance therapy on changing beliefs toward substance abuse among addicted people. Method: The research method was a quasi-experimental pretest-posttest with witness group. 30 addicted people who were referred to the addiction treatment centers selected by available sampling...

2009
Amirali Salehi-Abari Tony White

In ways analogous to humans, autonomous agents require trust and reputation concepts in order to identify communities of agents with which to interact reliably. This paper defines a class of attacks called witness-based collusion attacks designed to exploit trust and reputation models. Empirical results demonstrate that unidimensional trust models are vulnerable to witness-based collusion attac...

2015
Leonid Reyzin Sophia Yakoubov

Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership of the element. Typically, the membership witness has to be synchronized with the accumulator value: it has to be updated every time another e...

2012
V. Manjula C. Chellappan

The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method R...

Journal: :Journal of Semantics 2016

Journal: :Journal of Symbolic Computation 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید