نتایج جستجو برای: the secret agent
تعداد نتایج: 16078161 فیلتر نتایج به سال:
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
Incentive auctions let several participants to cooperate for clearing a set of offers and requests, ensuring that each participant cannot do better than by inputing his true utility. This increases the social welfare by efficient allocations, and is proven to have similar outcomes as the traditional English Auctions. The desk-mates (stable matchings) problem comes from the need of placing stude...
Inmany applications of networked information systems, the need to share information often has to be balanced against the need to protect secret information from unintended disclosure, e.g., due to copyright, privacy, security, or commercial considerations. We study the problem of secrecy-preserving reasoning, that is, answering queries using secret information, whenever it is possible to do so,...
The desk-mates matcher application places students in pairs of two for working in projects (similar to the well known problems of stable matchings or stable roommates). Each of the students has a (hopefully stable) secret preference between every two colleagues. The participants want to find an allocation satisfying their secret preferences and without leaking any of these secret preferences, e...
How does the use of a secret vote affect the likelihood that legislators will punish their peers? Two contending arguments exist in the literature: some argue that secret voting may be prejudicial, while others argue that it may help accountability. We address this controversy by analyzing the case of the Brazilian Congress, which uses a sequential combination of open and secret voting procedur...
چکیده: در این تحقیق تأثیر ملاس که یکی از محصولات جانبی صنایع قند می باشد به عنوان یک افزودنی مقاومت خشک جدید در بهبود پالایش پذیری و ویژگی های فیزیکی و مکانیکی مقوای کنگره ای کهنه (occ) مورد بررسی قرار گرفته شد. بدین منظور پنج سطح ملاس( 0،5، 10، 15 و 18%) و سه سطح درجه روانی(420،400و320 میلی لیتر)به عنوان فاکتورهای متغیر در نظر گرفته شد و برای هر تیمار کاغذهای دست ساز با مساحت 2cm200 و وزن پای...
For mission-critical and safety-critical systems such as medical, financial, or administrative information systems, a secure and reliable storage system is indispensable. The main purpose of our research is to develop a highly secure and highly reliable storage system. We have proposed a storage system that utilizes a secret sharing scheme. The storage system is called the Secret Sharing Storag...
Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید