Zobrazeno 1 - 10
of 754
pro vyhledávání: '"proof system"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 9, Pp 51368-51379 (2021)
This paper considers the problem of expanding a language class that can be proven by a non-interactive zero-knowledge proof system (NIZK) in a black-box manner in the common reference string model. Namely, given NIZKs for two languages, ${\mathcal L}
Externí odkaz:
https://doaj.org/article/9adf2f6986f34a6286f29441eb7026d4
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Arena Hukum, Vol 13, Iss 2, Pp 348-368 (2020)
Abstract It is interesting to examine how a judge can convince himself that he has found the material truth of a criminal act. The purpose of this study is to find the measurement and criteria of judges' confidence in the evidentiary process of a tr
Externí odkaz:
https://doaj.org/article/9a22a2c538a54066b59f99f527f1b3ee
Publikováno v:
Jurnal Mercatoria, Vol 13, Iss 1, Pp 29-35 (2020)
The eradication of corruption was carried out in many ways, one of which with a reverse proof system which was established with the act of eradication of corruption crimes. The upside-down reproof is an aberration of evidence in the act of events. In
Externí odkaz:
https://doaj.org/article/6cf7c9dceeb1414a87b117a26e0b4c42
Publikováno v:
Sociological Jurisprudence Journal, Vol 2, Iss 1, Pp 67-72 (2019)
The Criminal Procedure Code in Indonesia is not known to other parties, other than to law enforcement officers who represent victims (Investigators or Public Prosecutors), suspects (Legal advisors) and Judges. However, in civil law, there are known o
Externí odkaz:
https://doaj.org/article/507df782024e454eb0d8c655225616db
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 7, Pp 155143-155157 (2019)
Since hash proof system (HPS) can be utilized to build versatilely cryptographic schemes, the study on realizing this cryptographic primitive has been a very active research area. With the increasing concerns on the huge progress in quantum computing
Externí odkaz:
https://doaj.org/article/14fe8e7a03a545d6810d182ad3898942
Publikováno v:
IEEE Access, Vol 7, Pp 125732-125746 (2019)
Due to the confidentiality of the classified information system, it is isolated from the external network, but it is necessary to exchange data with an external network. This makes data exchange security between classified networks an important probl
Externí odkaz:
https://doaj.org/article/6de79cbc77114ce5aa66c59d0f77c1c8
Publikováno v:
CCS 2021-ACM SIGSAC Conference on Computer and Communications Security
CCS 2021-ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2541-2563, ⟨10.1145/3460120.3484548⟩
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2541-2563, ⟨10.1145/3460120.3484548⟩
CCS
CCS 2021-ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2541-2563, ⟨10.1145/3460120.3484548⟩
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2541-2563, ⟨10.1145/3460120.3484548⟩
CCS
International audience; In this paper we enhance the EasyCrypt proof assistant to reason about computational complexity of adversaries. The key technical tool is a Hoare logic for reasoning about computational complexity (execution time and oracle ca