نتایج جستجو برای: sealed secret
تعداد نتایج: 22719 فیلتر نتایج به سال:
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...
We present an approach to provide a fault-tolerant and secure service for sealed-bid auctions. The solution is designed for a loosely coupled publish-subscribe system. It employs multiple auction servers and achieves validity and security properties through application of secret-sharing methods and public-key encryption and signatures. It can tolerate Byzantine failures of one third of the auct...
In modern electronic distribution networks, message authentication is an important objective of information security. This objective is met by providing the receiver of a message an assurance of the sender’s identity. As physical protection such as sealed envelopes is not possible for messages expressed as binary sequences, digital tools have been developed using cryptography. A major limitatio...
in this project have been done in descriptive-analyze method, mid utilize from mythology-psychology by studying women characters in five plays. we are searching traits of “wild woman archetype” in secret defense drama. this archetype has been formed from theories of carel gustave yung, unregarded in literary and artistically studying in my country. important asking in this article is introducin...
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
Guttmacher Institute/IUSSP into an envelope and seals it, then puts the envelope into a ballot box or gives it to the interviewer, who puts it into a bag or box with other envelopes. To increase the likelihood that respondents will report their abortions, it must be clear to them that the interviewer has no way of identifying the information as being specific to any individual respondent. The d...
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید