نتایج جستجو برای: refusing to accept repudiation

تعداد نتایج: 10614899  

Journal: :Health expectations : an international journal of public participation in health care and health policy 2014
Mari Broqvist Peter Garpenby

BACKGROUND The publicly financed health service in Sweden has come under increasing pressure, forcing policy makers to consider restrictions. OBJECTIVE To describe different perceptions of rationing, in particular, what citizens themselves believe influences their acceptance of having to stand aside for others in a public health service. DESIGN Qualitative interviews, analysed by phenomenog...

Journal: :Electronic Commerce Research and Applications 2004
Jose Antonio Onieva Jianying Zhou Javier López Mildrey Carbonell Castro

Non-repudiation is a security service that provides cryptographic evidence to support the settlement of disputes in electronic commerce. In commercial transactions, an intermediary (or agent) might be involved to help transacting parties to conduct their business. Nevertheless, such an intermediary may not be fully trusted. In this paper, we propose agent-mediated non-repudiation protocols, and...

2003
Seung-Hyun Seo Sang-Ho Lee

Recently, Park and Lee [6] proposed the nominative proxy signature scheme for mobile communication. In [6], they argued that their scheme satisfies the following security requirements: user anonymity, authentication and non-repudiation. However, in this paper, we show that their scheme does not satisfy the non-repudiation among their security requirements. And then we propose a new nominative p...

Journal: :Computer Networks 2007
Mo-Che Chan Shun-Yun Hu Jehn-Ruey Jiang

In recent years,massivelymultiplayer online games (MMOGs) have become very popular by providing more entertainment and sociability than single-player games. In order to prevent cheaters to gain unfair advantages in peer-to-peer (P2P)-based MMOGs, several cheat-proof schemes have been proposed by using digital signatures. However, digital signatures generally require large amount of computations...

2006
Zinaida Benenson Felix C. Freiling Birgit Pfitzmann Christian Rohner Michael Waidner

We introduce verifiable agreement as a fundamental service for securing mobile peer-to-peer ad hoc networks, and investigate its solvability. Verifiability of a protocol result means that the participants can prove that the protocol reached a particular result to any third party (the verifier) which was not present in the network at the time of the protocol execution.

Introduction: Reporting medication errors leads to saving patients' wellbeing and safety and also is counted as a valuable information source for preventing further mistakes in future. The aim of this study was to determine the causes for refusing to report medication errors from the viewpoints of nursing students. Methods: All nursing students of Arak University of Medical Sciences (n=76) wer...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Ruggero Lanotte Andrea Maggiolo-Schettini Angelo Troina

We define a probabilistic model for the analysis of a Non-Repudiation protocol that guarantees fairness, without resorting to a trusted third party, by means of a probabilistic algorithm. By using the PRISM model checker, we estimate the probability for a malicious user to break the non-repudiation property, depending on various parameters of the protocol.

Journal: :Polibits 2009
Tran Khanh Dang Thi Thanh Huyen Phan

commerce, is still at the start. In this paper, we propose an extension of existing mobile payment models to introduce an extended mobile payment service (EMPS) model, which is based on assumptions about the cooperation between mobile network operators and financial institutions to deal with different payment amounts ranging from micro to macro payment. The novel model focuses on enhancement of...

Journal: :Journal of Experimental Medicine 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید