نتایج جستجو برای: Asymmetric Verifiability
تعداد نتایج: 66461 فیلتر نتایج به سال:
The use of e-Auction services has been increasing in recent years. Security requirements in conducting eAuctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with a...
To make authenticated encryption which provides confidentiality and authenticity of a message simultaneously, a signcryption scheme uses asymmetric primitives, such as an asymmetric encryption scheme for confidentiality and a signature scheme for authentication. Among the signcryption schemes, the hybrid signcryption schemes are the signcryption schemes that use a key agreement scheme to exchan...
Investigating the performance of companies is one of the most important issues for the users of accounting information. The purpose of this study was to provide evidence about the effect of asymmetric appropriateness on investors' expectations. The results of the research on accepted companies In the Tehran Stock Exchange during the period from 2012 to 2016. To collect data, a library method wa...
There have been intensive research efforts in the last two decades or so to design and deploy electronic voting (e-voting) protocols/systems which allow voters and/or external auditors to check that the votes were counted correctly. This security property, which not least was motivated by numerous problems in even national elections, is called verifiability. It is meant to defend against voting...
BACKGROUND Disability benefits exist to redeem social and financial consequences of reduced work ability from medical conditions. Physicians are responsible for identifying the medical grounds for benefit claims. The aim of this study was to explore physicians' views on verifiability of medical conditions and related work ability in this context. METHODS Information on verifiability of diagno...
This paper studies the effectiveness of interim information in reducing inefficiencies in long term relationships. If the interim information is verifiable, it resolves all problems of asymmetric information. Under nonverifiability, the information alleviates the contracting problem only partially and its optimal use depends on the signal’s accuracy and timing. Precise and early signals enable ...
One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability. On the one hand, privacy requires that a vote cannot be traced back from the result to a voter, while on the other hand, verifiability states that a voter can trace the effect of her vote on the result. This can be addressed using various privacy-e...
Administrative verifiability gives election officials the means to protect against certain kinds of errors and fraud. This is typically accomplished with tools like paper audit trails that enable manual recounts and spot checks. Public verifiability uses cryptographic and related tools to enable any member of the public to independently fully verify the accuracy of an election tally. Although p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید