نتایج جستجو برای: trade secrets and etsn

تعداد نتایج: 16839256  

Journal: :Nursing times 1997
C Kenny

The explosive power of people’s secrets and lies will once again take center stage in season two of ABC’s hit drama, “Secrets and Lies.” No matter who you are, everyone has secrets and everybody tells lies. What will people do to keep their most intimate, devastating indiscretions from ruining their lives? The unflappable and formidable Detective Andrea Cornell (Juliette Lewis) is back. She is ...

2007
Bruhadeshwar Bezawada Sandeep S. Kulkarni

In this paper, we present a lower bound on secret distribution in star network. Examples of star communication network exist in various systems including sensor networks where there is one base station and several sensors that need to communicate with it. While the previous result had shown the possibility of performing secret distribution in a star network using 2 log n secrets, the lower boun...

2003
Chou-Chen Yang Ting-Yi Chang Min-Shiang Hwang

10 In the ðt; nÞ multi-secret sharing scheme, there are n participants in the system. At 11 least t or more participants can easily pool their secrets shadows and reconstruct p 12 secrets at the same time. Chien et al. [IEICE Trans. Fundamentals E83-A (2000) 2762] 13 used (nþ p t þ 1) public values, ð2ðnþ pÞ tÞ ðnþ pÞ storages, and solved (nþ 14 p t) simultaneous equations to share p secrets. I...

2008
Abhishek Bhowmick Catuscia Palamidessi

In information-hiding, an adversary that tries to infer the secret information has a higher probability of success if it knows the distribution on the secrets. We show that if the system leaks probabilistically some information about the secrets, (that is, if there is a probabilistic correlation between the secrets and some observables) then the adversary can approximate such distribution by re...

Journal: :J. Algorithms 1989
Nancy M. Amato Manuel Blum Sandy Irani Ronitt Rubinfeld

In this paper we study a reversing train puzzle proposed by Sam Loyd near the turn of the century. We concern ourselves with a version of this puzzle described most recently by A. K. Dewdney in Scientific American. There is a train, locomotive and n cars, that must be entirely reversed using only a short spur line attached to the main track. The efficiency of a solution is determined by summing...

Tran Van Hoa

  The paper uses economic and energy data analysis and econometric modeling to study the prospects and challenges of Korea’s 2003 FTA Roadmap (MOFAT 2013) in the form of potential comprehensive partnerships with its major trade and energy partners. It first reviews Korea’s international economic and trade relations in recent years with a focus on its major merchandise export destinations an...

Journal: :JDFSL 2010
Grover S. Kearns

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forens...

2012
Janine L. Spears

During a lawsuit, an organization is required to discover and produce relevant electronic data. In many cases, relevant data includes confidential data, such as personal information or trade secrets. During the course of a lawsuit, the discovered data may exchange many hands. This study analyzes data security threats and corresponding countermeasures within the eDiscovery process by constructin...

2013
Rohit Ranchal Bharat K. Bhargava

Enterprises operate in a global economy with their operations dispersed across internal processes and external partners. Product Lifecycle Management (PLM) systems play a significant role in modern product development and management. There are multiple stages in product lifecycle that streamline by sharing data among PLM entities. Shared data may contain highly sensitive information such as tra...

Journal: :Computers & Security 2013
Ioana Lasc Reiner Dojen Tom Coffey

Many peer-to-peer security protocols in mobile communications utilise shared secrets. Synchronous storage of shared secrets is imperative for the successful operation of security protocols, as asynchronous storage of shared secrets may lead to service unavailability. Hence, update mechanisms must not only guarantee the secrecy of shared secrets, but also their synchrony. This paper addresses sy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید