«CONTRIBUTIVENESS»に関連する英語の本
以下の図書目録から
contributivenessの使いかたを見つけましょう。
contributivenessに関する本と英語文献で使われた文脈を提供するための簡単な抜粋文。
1
Autonomic and Trusted Computing: 4th International ...
The notion of verifiable contributiveness[1] is relevantto MA-security,since this
mechanism is designed for providing confirmation (and thus, verification) that the
protocol actually fits the security requirements. In the case of contributory
protocols ...
2
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' ...
The authors of [5] achieved (n/2,n)-contributiveness in an efficient way, and even
(n − 1,n)-contributiveness by running parallel executions of the protocol. We
claim that our proposed protocol directly achieves (n,n)-contributiveness (or ...
3
Public Key Cryptography - PKC 2009: 12th International ...
2.3 Contributiveness To ensure complete covering of insider securitynotions
wepresentbelow the notion ofcontributiveness byBresson and Manulis [6]. A
GKEprotocol secure under this notion resists the key control attacks
byPieprzykand ...
Stanislaw Jarecki, Gene Tsudik, 2009
4
An Introduction to Symbolic Logic
Contributiveness, therefore, is an important criterion of a good postulate; in fact, if
we have two propositions one of which is to be taken for granted, the greater
contributiveness of one as against the other may be the deciding factor in a
choice ...
Susanne Katherina Knauth Langer, 1967
5
Mainstreaming Ageing: Indicators to Monitor Sustainable Policies
To test them, we use two indicators of generosity for the years 1995 and 2000
and an indicator of contributiveness. They are presented in Tables 1 and 2. First,
there is the indicator of average generosity measured by the ratio of pension ...
Bernd Marin, M. Asghar Zaidi, 2007
6
Progress in Cryptology -- AFRICACRYPT 2009: Second ...
Weprove the protocol to be (n/2,n)-contributory, andshow in the full version how
to get the (n − 1,n)-contributiveness,with some parallel executions.Note that n/
2hereimplicitly means ⌊n/2⌋ when n is odd. Westartby givingan attack showing
that ...
7
Information Security and Cryptology - ICISC 2009: 12th ...
[7] defined contributiveness as another desired security notion for GKE protocols.
This notion demands that a proper subset of insiders should not predetermine the
resulting session key. Bresson and Manulis [5] strengthened this notion by ...
Donghoon Lee, Seokhie Hong, 2010
8
The Overburdened Economy: Uncovering the Causes of Chronic ...
Such activities, which pass the first test of contributiveness but fail the second, will
be called neutral. The process of which they are a part is contributive, but their
part in that process is unnecessary. Finally, activities that fail to pass even the first
...
9
It's a funny thing, humour
Yet the distinction is importent hers; the contributiveness criterion offers meny
fruitful suggestions for the evolution of ethnic humour theory. The distinction
bstueen comprehensiveness end contributiveness cen perhepe be eided by e
metephor ...
Antony J. Chapman, Hugh C. Foot, British Psychological Society. Welsh Branch, 1977
10
THE PHILOSOPHY OF AUDITING
The second is contributiveness. If a postulate has no implications, it contributes
nothing beyond the explicit fact which it states. This is, of course, perfectly
permissible, but a system which contains such assumptions is not entirely
deductive, and ...
R.K. MAUTZ, PH.D., C.P.A. AND HUSSEIN A. SHARAF, PH. D., 1961