Secure multi-party non-repudiation protocols and applications

Make translation of paper-based procedures to networked digital ones hard. Specific non-repudiation services. General contribution to multi-party problem. Summary of MPNR protocol properties. Supporting legal framework. Main model simulation event.

Подобные документы

  • Rapid application development - a software approach of construction of end-user products in conditions of changing user requirements and limited time resources. Specific features of high-level description of Framework for domain data organization.

    дипломная работа, добавлен 13.07.2020

  • Blind signature schemes as an important cryptographic primitive in protocols allowing to obtain a valid signature that guarantee the anonymity of the participants. Two new blind signature schemes based on the discrete logarithm problem are presented.

    статья, добавлен 15.09.2012

  • Modelling Rich Interaction: status–event analysis, sensor-based systems, rich environments in task analysis. Screen-button – HIT, MISS, widget. GTA - conceptual framework, tools, elicitation techniques. The main functions placeholders, its types.

    презентация, добавлен 28.12.2013

  • An analysis of some of the main methods and approaches of machine translation, which is designed to speed up the pace of translation of multilingual text. Review of the main functions of artificial neural networks used in neural machine translation.

    статья, добавлен 12.01.2023

  • Instructional design model is approaching creating rules to address into learning. The model was designed for simulation and that may easy to utilize by adept and beginner. The Ausubel’s Assimilation Theory is theory focus on "meaningful learning".

    реферат, добавлен 06.02.2014

  • Main features of BIM-technology. Getting of the digital copy of the building or a construction. Quick make changes to the project. Automation of issue of specifications and sheets of volumes. Main ways of achieving efficiency of the BIM-technology.

    реферат, добавлен 21.10.2016

  • Universal design principles. Peculiarities of using multi-sensory systems. Applying speech, non-speech, sound, touch, handwriting and gestures in multi-modal systems. Recognition problems in interactive computer systems. Personal orientation of design.

    презентация, добавлен 28.12.2013

  • The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.

    книга, добавлен 08.03.2014

  • The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.

    дипломная работа, добавлен 13.07.2020

  • Major machine translation methods designed to speed up the process of multilingual text translation by using a computer software. Analysis of the performance of rule-based machine translation, statistical models, hybrid and neural machine translation.

    статья, добавлен 16.08.2022

  • Study of issues of maximizing small root bounds by linearization and applications of subjects of small secret exponents in RSA. Secure network coding over the integers, and the CCA proxy re-encryption without bilinear maps in the standard model.

    материалы конференции, добавлен 08.03.2014

  • To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

    статья, добавлен 29.01.2016

  • Development and implementation of new technologies in banking services. The ability to improve the existing anti-fraud model used in real banking practice. Clusters and their impact on the assessment of the existing anti-fraud model. Data Chart Analysis.

    дипломная работа, добавлен 10.12.2019

  • Установка .NET Framework. Опция отдельной установки на примере компонента Sharepoint services 3.0. Создание веб-сайта Sharepoint с шаблоном Blog для публикации блога о ISA Server. Сопоставление альтернативного доступа (Alternate Access mapping).

    курсовая работа, добавлен 22.10.2014

  • Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.

    курсовая работа, добавлен 25.06.2017

  • Описание программного обеспечения, предназначенного для моделирования стока на основе гидрологической модели Multi-Layer Conceptual Model, v2. Прогнозирование дождевых паводков на малых водосборах, обладающих степенью гидрометеорологической изученности.

    статья, добавлен 20.04.2018

  • Information Hiding, Steganography, and Watermarking. Applications of Watermarking: Owner Identification, Broadcast Monitoring, Proof of Ownership, Transaction Tracking. Properties of Steganographic and Steganalysis Systems. Direct Message Coding.

    дипломная работа, добавлен 08.03.2014

  • The cognitive simulation of AstroDatabank records by using the artificial intelligence system with the neuron-net training and recognition. Structure of the analytical system. Studying the technology of simulation. Discussing the mostly important results.

    статья, добавлен 26.04.2017

  • Description of the main optional devices. TabletPC, processing power and hard drive. Scanner is an input device to the PC color or black and white images from paper. Basic user data: resolving power, scan speed, specifications. Printer, mouse, keyboard.

    презентация, добавлен 26.03.2013

  • JavaScript as a prototype-based scripting language programming. JavaScript as a language for embedded software applications access to objects. Use of browsers as a scripting language to make interactive Web pages. Key architectural features JavaScript.

    книга, добавлен 14.03.2014

  • Modifications of the method for the detection and localization of the cloned area. Digital images used in print media, medicine, science, legal proceedings. Falsification of a digital image. The difference between the source region and the counterfeit.

    статья, добавлен 28.08.2016

  • Определение порядка автоматической перекомпилирования частей большой программы утилитой make. Способы создания make-файлов и их взаимосвязь с программным обеспечением. Построение списка и хранение объектных файлов утилиты. Основные команды компиляции.

    лабораторная работа, добавлен 27.11.2013

  • The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.

    презентация, добавлен 13.09.2015

  • Research entities of the software defined networking which is currently one of the most promising technologies in mobile backhaul networks based on the open flow protocol. Characteristic apply Mininet software to verify the open flow protocol messages.

    статья, добавлен 29.07.2016

  • Характеристика языка программирования GPSS W (General Purpose Simulation System World). Системные числовые атрибуты. Перспективы развития языка GPSS W. Типы элементов схемы, связи. Пример разработки модели, с использованием расширенного редактора.

    лекция, добавлен 13.10.2017

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.