نتایج جستجو برای: Asymmetric Verifiability

تعداد نتایج: 66461  

Journal: :CoRR 2011
T. R. Srinath Mahendra Pratap Singh Alwyn Roshan Pais

The use of e-Auction services has been increasing in recent years. Security requirements in conducting eAuctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with a...

2002
Ik Rae Jeong Hee Yun Jeong Hyun Sook Rhee Dong Hoon Lee Jongin Lim

To make authenticated encryption which provides confidentiality and authenticity of a message simultaneously, a signcryption scheme uses asymmetric primitives, such as an asymmetric encryption scheme for confidentiality and a signature scheme for authentication. Among the signcryption schemes, the hybrid signcryption schemes are the signcryption schemes that use a key agreement scheme to exchan...

Investigating the performance of companies is one of the most important issues for the users of accounting information. The purpose of this study was to provide evidence about the effect of asymmetric appropriateness on investors' expectations. The results of the research on accepted companies In the Tehran Stock Exchange during the period from 2012 to 2016. To collect data, a library method wa...

Journal: :IACR Cryptology ePrint Archive 2016
Véronique Cortier David Galindo Ralf Küsters Johannes Müller Tomasz Truderung

There have been intensive research efforts in the last two decades or so to design and deploy electronic voting (e-voting) protocols/systems which allow voters and/or external auditors to check that the votes were counted correctly. This security property, which not least was motivated by numerous problems in even national elections, is called verifiability. It is meant to defend against voting...

Journal: :BMC Public Health 2008
Rein Overland Simon Overland Kristian Nyborg Johansen Arnstein Mykletun

BACKGROUND Disability benefits exist to redeem social and financial consequences of reduced work ability from medical conditions. Physicians are responsible for identifying the medical grounds for benefit claims. The aim of this study was to explore physicians' views on verifiability of medical conditions and related work ability in this context. METHODS Information on verifiability of diagno...

2005
Roland Strausz

This paper studies the effectiveness of interim information in reducing inefficiencies in long term relationships. If the interim information is verifiable, it resolves all problems of asymmetric information. Under nonverifiability, the information alleviates the contracting problem only partially and its optimal use depends on the signal’s accuracy and timing. Precise and early signals enable ...

Journal: :Computer Science Review 2013
Hugo L. Jonker Sjouke Mauw Jun Pang

One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability. On the one hand, privacy requires that a vote cannot be traced back from the result to a voter, while on the other hand, verifiability states that a voter can trace the effect of her vote on the result. This can be addressed using various privacy-e...

Journal: :SSRN Electronic Journal 2017

2008
Josh Benaloh

Administrative verifiability gives election officials the means to protect against certain kinds of errors and fraud. This is typically accomplished with tools like paper audit trails that enable manual recounts and spot checks. Public verifiability uses cryptographic and related tools to enable any member of the public to independently fully verify the accuracy of an election tally. Although p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید