Malleability of complex networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Genetics and human malleability.

Just how much can, and should we change human nature by genetic engineering? Our response to that hinges on the answers to three further questions: (1) What can we do now? Or more precisely, what are we doing now in the area of human genetic engineering? (2) What will we be able to do? In other words, what technical advances are we likely to achieve over the next five to ten years? (3) What sho...

متن کامل

Self-Destruct Non-Malleability

We introduce a new security notion for public-key encryption (PKE) that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA), which appears to be the strongest natural PKE security notion below full-blown chosen-ciphertext (IND-CCA) security. In this notion, the adversary is allowed to ask many adaptive “parallel” decryption queries (i.e., a query consists of many ci...

متن کامل

The Malleability of TSP_{2Opt}

We prove that the local search optimization problem TSP 2Opt |though not known to be PLS-complete|shares an important infeasibility property with other PLS-complete sets.

متن کامل

The malleability of anchoring effects.

Anchoring effects--the assimilation of a numeric estimate to a previously considered standard--are typically described as very robust and persistent. Based on the assumption that judgmental anchoring involves a hypothesis-testing process in which judges actively seek and generate judgment-relevant target knowledge, it was assumed that anchoring effects might at the same time be fairly malleable...

متن کامل

Bitcoin Transaction Malleability and MtGox

In Bitcoin, transaction malleability describes the fact that the signatures that prove the ownership of bitcoins being transferred in a transaction do not provide any integrity guarantee for the signatures themselves. This allows an attacker to mount a malleability attack in which it intercepts, modifies, and rebroadcasts a transaction, causing the transaction issuer to believe that the origina...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Statistical Mechanics: Theory and Experiment

سال: 2019

ISSN: 1742-5468

DOI: 10.1088/1742-5468/ab2ad1