نتایج جستجو برای: sealed secret
تعداد نتایج: 22719 فیلتر نتایج به سال:
Visual secret sharing scheme (VSSS) is a secret sharing method which decodes the secret by using the contrast ability of the human visual system. Autostereogram is a single two dimensional (2D) image which becomes a virtual three dimensional (3D) image when viewed with proper eye convergence or divergence. Combing the two technologies via human vision, this paper presents a new visual secret sh...
Secret Sharing techniques are now the building blocks of several security protocols. A (t, n) threshold secret sharing scheme is one in which t or more participant can join together to retrieve the secret.Traditional single secret sharing schemes are modified and generalized to share multiple secrets.Use of elliptic curve and pairing in secret sharing is gaining more importance.In this paper we...
The increasing prevalence of auctions as a method of conducting a variety of transactions has promoted interest in modelling bidding behaviours with simulated agent models. The majority of popular research has focused on double auctions, i.e. auctions with multiple buyers and sellers. In this paper we investigate agent models of sealed bid auctions, i.e. single seller auctions where each buyer ...
This Federal Judicial Center publication was undertaken in furtherance of the Center's statutory mission to conduct and stimulate research and development for the improvement of judicial administration. The views expressed are those of the authors and not necessarily those of the Federal Judicial Center.
1. Introduction. Recent empirical and anecdotal evidence suggests that different auction rules generate important differences in bidding behavior. Milgrom (1996) compares auctions for the sale of the radio spectrum held in the United States, New Zealand and Australia. The Australian and New Zealand auctions were characterized by wildly different prices for similar bandwidths. In the United Stat...
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation, and are not robust in dealing with system malfunction or user misbehavior. In this paper, we propose a secure and practical double auction protocols based on a hybrid trust model, where computation loa...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید