搜索结果: 1-14 共查到“军事学 financial”相关记录14条 . 查询时间(0.234 秒)
Economic and Financial Sanctions in U.S. National Security Strategy
U.S. National Security Strategy Economic Financial Sanctions
2019/10/11
Coercive U.S. strategies often feature the use of economic and financial sanctions to address national security threats. According to the most recent U.S. National Security Strategy, sanctions and oth...
NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary
2nd layer protocols blockchain scalability
2018/7/9
Bitcoin is meant to offer a payment system where the users are custodians of their funds instead of entrusting a trusted financial institution. The limited transaction throughput of such permissionles...
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Poker Card Games Fairness Blockchain
2018/3/7
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of co...
Centralized reputation systems use stars and reviews and thus require algorithm secrecy to avoid manipulation. In autonomous open source decentralized systems this luxury is not available. We create a...
Mobile Commerce: Secure Multi-party Computation & Financial Cryptography
Secure multi-party computation Financial cryptography Mobile commerce mechanism
2016/12/29
The basic objective of this work is to construct an efficient and secure mechanism for mobile
commerce applying the concept of financial cryptography and secure multi-party computation. The
mechanis...
Financial Cryptography: Discriminatory Pricing Mechanism
Financial cryptography pricing mechanism secure function decomposition
2015/12/31
This work presents an adaptive profitable discriminatory pricing mechanism for cloud computing based on secure function decomposition, cryptographic commitments and zero knowledge proof. Cloud computi...
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Financial cryptography Private comparison Yao’s Millionaire problem
2015/12/31
A (or a group of) selling agent wants to allocate and sell a (or a set of) parcel of land optimally and fairly to a buying agent within the capacity constraint of the selling agent and budget constrai...
Deploying secure multi-party computation for financial data analysis
applications / financial data analysis privacy-preserving data mining secure multi-party computation
2012/8/28
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...
Deploying secure multi-party computation for financial data analysis
applications / financial data analysis privacy-preserving data mining secure multi-party computation
2012/3/20
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...
Deploying secure multi-party computation for financial data analysis
financial data analysis privacy-preserving data mining secure multi-party computation
2012/6/14
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...
Deploying secure multi-party computation for financial data analysis
applications / financial data analysis privacy-preserving data mining secure multi-party computation
2012/8/28
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...
In standard voting procedures, random audits are one method for increasing election integrity. In the case of cryptographic (or end-to-end) election verification, random challenges are often used to e...
Public Key Cryptography For The Financial Services Industry:ECDSA
Public Key Cryptography Financial Services Industry ECDSA
2008/5/19
(Informative)
Business practice has changed with the introduction of computer-based technologies. The substitution of electronic
transactions for their paper-based predecessors has reduced costs and...
Public Key Cryptography For The Financial Services Industry:Key Agreement and KeyTransport
Public Key Cryptography Financial Services Industry Key Agreement KeyTransport 公钥密码标准
2008/5/19
Notice -- This document is a draft document. It has not yet been processed through the consensus
procedures of X9 and ANSI.
Many changes which may greatly affect its contents can occur before this d...