نتایج جستجو برای: the secret agent

تعداد نتایج: 16078161  

Journal: : 2022

The article analyses the means of linguistic explication frame love affair in Russian language. data came from etymological, explanatory, and derivational dictionaries. concept was described through paradigmatic, syntagmatic, peculiarities words that represent concept. reconstructed as a with following slots: aim, action, agent, counter-agent, patient, evaluation, result. aim research to show h...

Journal: :مطالعات حقوق خصوصی 0
محمود باقری مریم گودرزی

in the past and before granting the inventors and owners of intellectual property rights special exclusive rights and privileges under the patent laws, the protection of intellectual property rights was possible only through a legal regime which could help to keep the know how and innovation secret. this regime, in which contractual terms are often used to keep the innovation secret, is called ...

Journal: :The Iowa Review 1972

2005
Marius C. Silaghi

Within incentive auctions, several bidders cooperate for clearing a set of offers or requests formalized by an auctioneer, ensuring that each participant cannot do better than by inputing his true utility. We use a distributed weighted constraint satisfaction (DisWCSP) framework where the actual constraints are secrets that are not known by any agent. They are defined by a set of functions on t...

1998
Tomas Sander Christian F. Tschudin

A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under execution and (b) the mobile code against tampering attempts by the executing host. Many techniques for the first problem (a) have been developed. The second problem (b) seems to be much harder: It is the general bel...

Journal: :Annales UMCS, Informatica 2007
Bogdan Ksiezopolski Pascal Lafourcade

In the article we show an attack on the cryptographic protocol of electronic auction with extended requirements [1]. The found attack consists of authentication breach and secret retrieval. It is a kind of “man in the middle attack”. The intruder impersonates an agent and learns some secret information. We have discovered this flaw using OFMC an automatic tool of cryptographic protocol verifica...

2012
Aveek Dutta Dola Saha Dirk Grunwald Douglas C. Sicker

In this paper we propose a novel approach to implement high capacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a “dirty” constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید