نتایج جستجو برای: verification is not verifiable

تعداد نتایج: 7944505  

Journal: :J. Comput. Syst. Sci. 1988
Gilles Brassard David Chaum Claude Crépeau

Protocols are given for allowing a “prover” to convince a “verifier” that the prover knows some verifiable secret information, without allowing the verifier to learn anything about the secret. The secret can be probabilistically or deterministically verifiable, and only one of the prover or the verifier need have constrained resources. This paper unifies and extends models and techniques previo...

it is not possible to understand developments of a country’s culture and civilization without knowing his believes and myths. whether it is north or south, east or west, planes or mountains, sahara or deserts, here in iran every corner includes valuable and precious treasures which are known all over the world, and cultural – historical objects which are found here adorn all well known museums of the globe. zagros mountains, lorestan province locating at the heart of that, are not only the same, but are more prominent than other iranian regions. you can not find someone who does not know what the lorestani bronzes are, and there is no museum that not be pride of having a piece of that. the said bronzes which are manufactured four millenniums b.c. are admired nearly by all those researchers because of their beauty, diversity and technique. lorestani artistic works including stone engraves, bronzes and clays, show an ideal and metaphysical world beside real world which explain mental system of human beings on that era against sensations and phenomena happening around them. men main mental occupation on that time was he unknown world which had surrounded them, and they used to use the religion to fight life’s natural factors, and art was a tool of religious and mythical painting which was far from reality and had entered into the abstract domain. as natural objects have become subjects of lorestani art, it cleanses them from any non – intrinsic limitations and external factors which surround them and darken their meanings, and just shows their main specifications. artist in the said civilization is not searching for realism. although these are few works showing the nature, but in effect there is no wish to imitate touchable factors of the nature, and artist has turned real phenomena to encoded signs as per his own mentality. this procedure is called stylization.

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده هنر و معماری 1391

it is not possible to understand developments of a country’s culture and civilization without knowing his believes and myths. whether it is north or south, east or west, planes or mountains, sahara or deserts, here in iran every corner includes valuable and precious treasures which are known all over the world, and cultural – historical objects which are found here adorn all well known museums...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم و معارف قرآن کریم - دانشکده علوم قرآنی قم 1389

worship is submission and humitility with believe to divinity in fornt of god. in jewish religion ,worship is submission of the god inall the ordes and devosion tohim .worshio is not only so widely in islam and jew and does not include pray and fast and etc but also is every action that human does with divine intention and to content him. worship has huge and excellent rank in qoran and old te...

Journal: :I. J. Network Security 2012
Youliang Tian Changgen Peng Jianfeng Ma

A non-interactive, simple and efficient publicly verifiable secret sharing (PVSS) is constructed based on the bilinear pairing on elliptic curves, which has all advantages of Schoenmakers’ PVSS in [15]. Moreover, in the scheme’s distribution of shares phase, only using bilinearity of bilinear paring, anybody can verify that the participants received whether correct shares without implementing i...

Journal: :JCM 2008
Jia Yu Fanyu Kong Rong Hao Xuliang Li Guowen Li

Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electronic applications. In this paper, we propose a publicly verifiable member-join protocol for threshold signatures. In our proposal, a new member can join a PVSS scheme to share the secret only with the help of old shareho...

2009
Christoph Gladisch

The method contract and loop invariant rules (contract rules) are an important software verification technique for handling method invocations and loops. However, if a verification condition resulting from using a contract rule turns out to be falsifiable, then the user does not know if she could have chosen a stronger contract to verify the program or if the program is not verifiable due to a ...

2011
Kun Peng

VSS (verifiable secret sharing) is an important security protection tool in distributed systems. When VSS is employed in publicly verifiable applications, it needs to achieve public verifiability and be upgraded to PVSS (publicly verifiable secret sharing). Besides the two basic security properties, bindingness and hidingness, PVSS concentrates on public verifiability of validity all the operat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده حقوق و علوم سیاسی 1390

the author intend to by studying the historical causes of the appearance of the novation in the west and explanation of its legal nature from past to present of french law, proves on the one hand that the novation does not extracted from the french civil code and in the shiite jurisprudence with quite similar terms even before the enactment of iranian civil code, was considered by the shiite su...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

this study considers the level of increase in customer satisfaction by supplying the variant customer requirements with respect to organizational restrictions. in this regard, anp, qfd and bgp techniques are used in a fuzzy set and a model is proposed in order to help the organization optimize the multi-objective decision-making process. the prioritization of technical attributes is the result ...

پایان نامه :0 1375

investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید