Enhancement of off-key pecking by on-key punishment1
نویسندگان
چکیده
منابع مشابه
Technical Report Key Distribution versus Key Enhancement in Quantum Cryptography
It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement This means that two parties who already share a small secret key can use quantum protocols to establish a new large secret key This large secret key can be arbitrarily long and is unbreakable Thus to date the main contribution of quantum cryptography has been believed to be quan tum k...
متن کاملKey Distribution versus Key Enhancement in Quantum Cryptography
It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, can use quantum protocols to establish a new large secret key. This large secret key can be arbitrarily long and is unbreakable. Thus, to date, the main contribution of quantum cryptography has been believed to be quan...
متن کاملEconomic and biological influences on key pecking and treadle pressing in pigeons.
Pigeons were studied on a two-component multiple schedule in which the required operant was, in different conditions, biologically relevant (i.e., key pecking) or nonbiologically relevant (i.e., treadle pressing). Responding was reinforced on a variable-interval (VI) 2-min schedule in both components. In separate phases, additional food was delivered on a variable-time (VT) 15-s schedule (respo...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملAn Enhancement of Security on Image Applying Asymmetric Key Algorithm
Every characters of textual message are encrypted through the encryption key of RSA algorithm and then to an array of data bits. After that the data bits are embedded to some suitable nonlinear pixel and bit positions about the entire image through system modulus of RSA algorithm. As a result, we get a watermarked image. After that we have formed three different image shares using any two compo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Experimental Analysis of Behavior
سال: 1969
ISSN: 0022-5002
DOI: 10.1901/jeab.1969.12-789