نتایج جستجو برای: the secret agent

تعداد نتایج: 16078161  

Journal: :CoRR 2010
Sahana S. Bisalapur

The goal of any cryptographic system is the exchange of information among the intended users without any leakage of information to others who may have unauthorized access to it. A common secret key could be created over a public channel accessible to any opponent. Neural networks can be used to generate common secret key. In case of neural cryptography, both the communicating networks receive a...

The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...

2011
Michael H. Albert Andrés Cordón-Franco Hans van Ditmarsch David Fernández-Duque Joost J. Joosten Fernando Soler-Toscano

Given an interpreted system, we investigate ways for two agents to communicate secrets by public announcements. For card deals, the problem to keep all of your cards a secret (i) can be distinguished from the problem to keep some of your cards a secret (ii). For (i): we characterize a novel class of protocols consisting of two announcements, for the case where two agents both hold n cards and t...

Journal: :J. Artificial Societies and Social Simulation 2014
Emmanuel Labarbe Daniel Thiel

Agents who invest periodically in two complementary projects i and j try to minimize shortfall due to misperceptions concerning the interaction α between i and j. Previous studies have analytically solved such problems but they have been limited to two agents making one decision. We set out with the hypothesis of a large number of deciders sharing information with their nearest neighbors in ord...

In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

Abbas Cheraghi,

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

2017
Dylan Liu

Quantum secret sharing addresses the same problem that classical secret sharing does, but via quantum means. That is, Alice wishes to send a secret to n agents, and any k ≤ n agents can collaborate to recover the secret. However, for any fewer than k agents, collaboration will information-theoretically reveal no information about the secret. Such protocols are called (k,n)threshold schemes, and...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1389

abstract: sayyed mohammad tabatabaee is accounted as one of the effective persons in iran contemporaneoushistory and his role in the events of iran constitution revolution is inevitable. sayyed mohammad tabatabaee from the time of naser al din shah qajar and arrival to iran, informed of the advantages and the basis of constitution, was in the thought of making the iran rule as a constituti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید