نتایج جستجو برای: the secret agent
تعداد نتایج: 16078161 فیلتر نتایج به سال:
This paper proposes a dynamic multiparty to quantum secret sharing scheme, where two distant groups of participants can share the common secrets. In our present trusted third party is required reliably prepare all resources. Each agent only needs perform local unitary operations or single-particle measurement completing process sharing. Secret be recovered if agents cooperate each other. Furthe...
This research is written to analyze the representation of Agent Peggy Carter in television series <em>Marvel Agent’s: (ABC, 2015 – 2016). </em>Agent an agent turns into secretary who works secret division Strategic Scientific Reserve. tried fight against sexism from her male counterparts workplace. The was planned be produced three seasons. However, due low rating second season, pro...
This article examines the ways in which Fflur Dafydd’s 2008 novel Twenty Thousand Saints negotiates notions of the island space in a post-devolution Welsh context. It argues that the novel is a rich site in the analysis of the literary dimension of what Baldacchino describes as the “island-mainland [...] dialectic” (Baldacchino, 2006, p. 10). Set on Bardsey, a real small island off the coast of...
Recently, some group key transfer protocols are proposed using Shamir’s secret sharing, which are claimed to be secure to resist the insider attack and the outsider attack. In fact, some claims are not really true. In this paper, we review the recently proposed protocol by Yuan et al. and the cryptanalysis presented by Olimid, then give the improved version to guarantee the security and low com...
trade secrets has an important role in economic growth and development of economic competition. however ,one of the challenges in this sphere is the emergence of economice spionag. increasing growth of economic espionage causes to emerge a new phenomenon which is called information terrorism. so the mechanism of protection of the trade secretsincivil and criminal law is necessary for economic g...
The paradigm of mobile agents reached its popularity and attraction from typical application scenarios, which are located in the area of electronic commerce. In these common application scenarios, mobile agents get a task from its owner to buy certain goods. To fulfill this task, the agent wanders to various merchants and collects information about the different offers. In this paper we present...
In an audio secret sharing scheme, the shares are created by embedding the secret message into an audio file. The audio or the music file which is used to embed the given message is called cover sound. A 2-out-of-2 audio cryptography is a secret sharing scheme that can be used to hide a digital message into 2 shares and we can perceive the message by playing these 2 sounds simultaneously. In th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید