نتایج جستجو برای: secrets divins

تعداد نتایج: 4175  

2017
Daron Acemoglu James A. Robinson

This paper corrects Proposition 1 in Acemoglu and Robinson (2000). It shows that in addition to parts of the parameter space where the unique MPE is franchise extension and temporary redistribution, there is an intermediate part of the parameter space where the unique MPE is in mixed strategies. In this region, there is a positive probability of franchise extension, but also a revolution takes ...

2015
Felix Thoemmes

Reversing arrows in the classic tri-variate X-M-Y mediation models as a test to check whether one mediation model is superior to another is inadmissible. Presenting evidence that one trivariate mediation model yields a significant indirect effect, whereas one with some reversed arrows does not, is not proof or even evidence that one model should be preferred. In fact, the significance of the in...

2007
Paul E. Sevinç Mario Strasser David A. Basin

We present a protocol that allows servers to securely distribute secrets to trusted platforms. The protocol maintains the confidentiality of secrets in the face of eavesdroppers and careless users. Given an ideal (tamper-proof) trusted platform, the protocol can even withstand attacks by dishonest users. As an example of its use, we present an application to secure document processing.

Journal: :Sociological Perspectives 2023

Keeping and telling secrets are acts of intimacy. This article explores secret-telling-friendly methodologies, capable encouraging individuals to share their life stories in own terms, with particular episodes, emotional connections, protagonists, also secrets. The openness our research design played an important part the identification role secret-storytelling understanding life. was enhanced ...

Journal: :Jurnal Ilmiah Kebijakan Hukum 2022

The Indonesian Trade Secrets Law Number 30/2000 (ITS Law) postulates exemptions for acts that are not considered infringements to protect trade secrets. One of them is the reverse engineering other people’s problem ITS does limit extent which can be justified. absence these limitations also allows attempts disclose secrets under pretext engineering. This ultimately results in legal certainty pr...

2017
David Webber

The Internet is an iconoclastic system which has introduced exciting new concepts in commerce and communications, whilst upsetting a number of traditional principles, including principles associated with intellectual property law. Intellectual property is a term coined to describe to the collective set of exclusive rights which creators can obtain for their works. The rights are provided by pat...

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

Journal: :ITC 2011
Ting Yi Chang Min-Shiang Hwang Wei-Pang Yang

Lee and Hwang proposed a multi-stage (t, n) secret sharing scheme which has fewer public values than pervious schemes. In their scheme, a group of participants share multiple secrets stage-by-stage, and only one secret share should been kept by each participant. However, in this article, we will show that multiple secrets cannot, in fact, be reconstructed stage-by-stage by the secret holder’s d...

2015
Jason Crampton Naomi Farley Gregory Gutin Mark Jones

The simple security property in an information flow policy can be enforced by encrypting data objects and distributing an appropriate secret to each user. A user derives a suitable decryption key from the secret and publicly available information. A chain-based enforcement scheme provides an alternative method of cryptographic enforcement that does not require any public information, the trade-...

Journal: :Inf. Process. Lett. 2015
Béatrice Bérard Krishnendu Chatterjee Nathalie Sznajder

Opacity is a generic security property, that has been defined on (non probabilistic) transition systems and later on Markov chains with labels. For a secret predicate, given as a subset of runs, and a function describing the view of an external observer, the value of interest for opacity is a measure of the set of runs disclosing the secret. We extend this definition to the richer framework of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید