نتایج جستجو برای: Unforgeability of Ticket

تعداد نتایج: 21164284  

2010
Kun Peng Feng Bao

A secure RFID ticket system for public transport is proposed in this paper. It supports security properties including secure authentication, unforgeability, correct billing and privacy and can prevent various attacks. It consists of two protocols, both following three principles necessary for secure RFID ticket system. The first protocol is very efficient and suitable for applications with crit...

Journal: :Inf. Sci. 2009
A. Tripathi T. Suman Kumar Reddy Sanjay Kumar Madria Hrushikesha Mohanty R. K. Ghosh

E-tickets issued online can be used by different vendors to provide services such as discount coupons for E-shopping, or an entrance for a football game. One major issue associated with E-tickets is the problem of validation, which becomes more severe in a mobile environment due to mobility of a mobile host (MH) and frequent failure/disconnection of validation servers known as mobile support st...

1999
Ko Fujimura Hiroshi Kuno Masayuki Terada Kazuo Matsuyama Yasunao Mizuno Jun Sekine

This paper presents a new digital-ticket circulating scheme and trust management scheme for a digital ticket. A digital ticket is a digital medium that guarantees certain rights of the owner and it includes software licenses, resource access tickets, event tickets, and plane tickets. The circulation of digital tickets comprises three types of principal transactions: issuance, transfer, and rede...

2012
Stephen L. Shapiro Joris Drayer

In 2010, the San Francisco Giants became the first professional team to implement a comprehensive demandbased ticket pricing strategy called dynamic ticket pricing (DTP). In an effort to understand DTP as a price setting strategy, the current investigation explored Giants’ ticket prices during the 2010 season. First, the relationship between fixed ticket prices, dynamic ticket prices, and secon...

Journal: :Informatica, Lith. Acad. Sci. 2015
Ying-Hao Hung Sen-Shan Huang Yuh-Min Tseng Tung-Tso Tsai

Abstract. Certificateless public-key systems (CL-PKS) were introduced to simultaneously solve two critical problems in public-key systems. One is the key escrow problem in ID-based public-key systems and the other is to eliminate the presence of certificates in conventional public-key systems. In the last decade, several certificateless signature (CLS) schemes have been proposed in the random o...

1998
Ko Fujimura Yoshiaki Nakajima

A digital ticket is a certificate that guarantees certain rights of the ticket owner. There are many applications for digital tickets but the ticket properties vary depending on the application. This variety makes the digital ticket processing system expensive, especially if dedicated systems must be developed for each application. This paper thus addresses issues on developing a common data sc...

Journal: :BJET 2007
Fengfeng Ke Barbara L. Grabowski

This study investigated the effects of gameplaying on fifth-graders’ maths performance and attitudes. One hundred twenty five fifth graders were recruited and assigned to a cooperative Teams-Games-Tournament (TGT), interpersonal competitive or no gameplaying condition. A state standardsbased maths exam and an inventory on attitudes towards maths were used for the pretest and posttest. The stude...

2006
Ross Gore Lewis Barnett

The Tutorial Generation Toolkit (TGT) is a set of Java classes that supports authoring of interactive tutorial applications. This paper describes extensions to the capabilities of the TGT and several new tutorials aimed at the Data Structures course which were built using the

Journal: :Quantum 2021

A Physical Unclonable Function (PUF) is a device with unique behaviour that hard to clone hence providing secure fingerprint. variety of PUF structures and PUF-based applications have been explored theoretically as well being implemented in practical settings. Recently, the inherent unclonability quantum states has exploited derive analogue new proposals for implementation PUF. We present first...

Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید