نتایج جستجو برای: sealed secret

تعداد نتایج: 22719  

Journal: :IACR Cryptology ePrint Archive 2006
Feng Yi Daoshun Wang Yiqi Dai

Visual secret sharing scheme (VSSS) is a secret sharing method which decodes the secret by using the contrast ability of the human visual system. Autostereogram is a single two dimensional (2D) image which becomes a virtual three dimensional (3D) image when viewed with proper eye convergence or divergence. Combing the two technologies via human vision, this paper presents a new visual secret sh...

Journal: :CoRR 2016
V. P. Binu A. Sreekumar

Secret Sharing techniques are now the building blocks of several security protocols. A (t, n) threshold secret sharing scheme is one in which t or more participant can join together to retrieve the secret.Traditional single secret sharing schemes are modified and generalized to share multiple secrets.Use of elliptic curve and pairing in secret sharing is gaining more importance.In this paper we...

2004
A. J. Bagnall

The increasing prevalence of auctions as a method of conducting a variety of transactions has promoted interest in modelling bidding behaviours with simulated agent models. The majority of popular research has focused on double auctions, i.e. auctions with multiple buyers and sellers. In this paper we investigate agent models of sealed bid auctions, i.e. single seller auctions where each buyer ...

Journal: :The Journal of Criminal Law, Criminology, and Police Science 1959

2009

This Federal Judicial Center publication was undertaken in furtherance of the Center's statutory mission to conduct and stimulate research and development for the improvement of judicial administration. The views expressed are those of the authors and not necessarily those of the Federal Judicial Center.

1999
Patrick Bajari

1. Introduction. Recent empirical and anecdotal evidence suggests that different auction rules generate important differences in bidding behavior. Milgrom (1996) compares auctions for the sale of the radio spectrum held in the United States, New Zealand and Australia. The Australian and New Zealand auctions were characterized by wildly different prices for similar bandwidths. In the United Stat...

Journal: :JCP 2006
JungHoon Ha Jianying Zhou Sang-Jae Moon

Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation, and are not robust in dealing with system malfunction or user misbehavior. In this paper, we propose a secure and practical double auction protocols based on a hybrid trust model, where computation loa...

Journal: :Applied Mathematics & Information Sciences 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید