نتایج جستجو برای: the secret agent

تعداد نتایج: 16078161  

2007
Andrei Markevich

A dictator issues an order, but the order is not carried out. The dictator does not know whether the order failed because the agent behaved opportunistically, or because his order contained some mistake. Imperfect information creates his dilemma: whether to punish the agent, or assist her or both. This paper models the dictator’s intervention when an order fails. The analysis links the dictator...

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

2014
Tomoko Adachi

2-level shared secret schemes are defined by Simmons in 1989. In this paper, we describe a survey of 2-level secret sharing schemes using finite geometry.

Journal: : 2023

The article is devoted to the legal framework of secret inventions, which are inventions made by order State expert. question regarded in connection war Ukraine. two regimes, one – patent protection regime, other state regime have a invention sphere their regulation. procedure expanding for unique and mentioned Patent Utility Model Act, although applicant secrecy could be both inventor or Secre...

Journal: :ACM Transactions on Architecture and Code Optimization 2015

2005
Christian Anhalt Stefan Kirn

2 PhD Thesis Project Working Title: Non-secret-based Payment Systems for Mobile Agents in open, service-oriented Environments. Background and research gap: Background of this PhD project is the " malicious host " problem in open environments for mobile agents. It describes the ability of any agent-executing platform to attack mobile agents, for example by spying out or manipulating code, data o...

Journal: :JDIM 2012
Yi-Hui Chen Chin-Chen Chang

Recently, verifiable secret sharing schemes have been proposed to keep participants from providing fake or illegal stego-images. However, the schemes do not consider the recovery mechanism when parts of the information in stego-images are lost or incidentally modified during the transmission process. This paper presents a novel verifiable and reversible secret sharing scheme based on Shamir’s s...

Journal: :IEICE Transactions on Information and Systems 2010

2011
Stéphane Airiau Yoram Bachrach Michael Wooldridge Georgios Chalkiadakis Tatiana Gvozdeva Ali Hameed Enrico Malizia Suguru Ueda Makoto Kitaki Atsushi Iwasaki Norman Salazar Juan Antonio Rodríguez

In both human and artificial societies some activities are only allowed to coalitions that satisfy certain criteria, e.g., to sufficiently large coalitions or coalitions which involve players of sufficient seniority. Simmons (1988) formalised this idea in the context of secret sharing schemes by defining the concept of a (disjunctive) hierarchical access structure. The mathematical concept whic...

Journal: :I. J. Network Security 2015
Bin Feng Cheng Guo Mingchu Li Zhi-Hui Wang

A proactive secret sharing scheme is a method of sharing a secret among a set of participants. And, the corresponding shadows can be periodically renewed under the premise of never changing the shared secret. However, in the most existing proactive secret sharing schemes, only one secret can be shared during one secret sharing process. The proposed scheme describes PMSS, a new way to share mult...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید