نتایج جستجو برای: sharing
تعداد نتایج: 87406 فیلتر نتایج به سال:
The main purpose of this study is to investigate the effect of human resources information systems on knowledge sharing through the mediation of organizational culture in Branches of Mellat Bank in Shiraz city. In this study, the key indicators for each variable of the study (human resources information systems, knowledge sharing and knowledge-based organizational culture) was given. then, they...
The file-sharing literature has focused mainly on whether file-sharing has decreased record sales, with less attention paid to the size of any decline. Although there is still some contention, most studies have concluded that filesharing has decreased record sales. What has not been noted is that most estimates indicate that the file-sharing has caused the entire enormous decline in record sale...
Abstract A (t, n) secret sharing scheme permits a secret to be divided into n shares in such a way that any t or more than t shares can reconstruct the secret, but fewer than t shares cannot reconstruct the secret. Verifiable secret sharing (VSS) has been proposed to allow each shareholder to verify the validity of his own share, but not other shareholders' shares. In this paper, we propose an ...
Visual secret sharing scheme (VSSS) is a secret sharing method which decodes the secret by using the contrast ability of the human visual system. Autostereogram is a single two dimensional (2D) image which becomes a virtual three dimensional (3D) image when viewed with proper eye convergence or divergence. Combing the two technologies via human vision, this paper presents a new visual secret sh...
A secret sharing scheme is a method to distribute a secret among a set of participants, such that only qualified subsets of the participants can recover the secret. A secret sharing scheme is perfect if any unqualified subset obtains no information regarding the master key. The collection of qualified subsets is called access structure. In a hypergraph, if the size of edges is equal to r, the h...
We segregate attacks into two categories – targeted and opportunistic – based on whether the attacker compromises a specific target (targeted) or a number of intermediate targets to fulfill his end goal (opportunistic). We assume that opportunistic attackers consider targets indistinguishable except for their vulnerabilities, and are interested in acquiring as many targets as possible. We there...
Mobile networks differ from their wireline counterparts mainly by the high costs for air transmissions and by the mobility of the users. A new entity, denoted as the crawling peer, is suggested in order to optimize the resource mediation mechanism for a mobile P2P file sharing application. In [1], we have investigated the performance of a crawling peer by means of simulations. Now, we show a ti...
Sharing common resources is amongst critical factors creating competitive advantages in business and manufacturing. In today’s competitive and dynamic environment, application of the resource sharing approach has become the focal point of attention for business managers. By resource sharing and through common platform guidelines, the possibility of producing an extended variety of products us...
Verifiable secret sharing schemes (VSS) are secret sharing schemes dealing with possible cheating by the participants. In this paper, we propose a new unconditionally secure VSS. Then we construct a new proactive secret sharing scheme based on that VSS. In a proactive scheme, the shares are periodically renewed so that an adversary cannot get any information about the secret unless he is able t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید