نتایج جستجو برای: keeping the secrets
تعداد نتایج: 16055413 فیلتر نتایج به سال:
0
Given n agents each of which has a secret (a fact not known to anybody else), the classical version of the gossip problem is to achieve shared knowledge of all secrets in a minimal number of phone calls. There exist protocols achieving shared knowledge in 2(n−2) calls: when the protocol terminates everybody knows all the secrets. We generalize that problem and focus on higher-order shared knowl...
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might pose such risks. This problem of controlled disclosure of sensitive information is an example of what is known as the aggregation problem. In this paper we argue that it should be possible to articulate specific secr...
Three high-power studies (N = 3,000 total) demonstrated that asking participants to recall an experience as a manipulation can have unintended consequences. Participants who recalled preoccupying secrets made more extreme judgments of an external environment, supporting the notion that secrecy is burdensome. This influence was found, however, only among a subset of participants (i.e., participa...
The paper challenges the prevalent paradigm that differentiates between the management of a core competence and commodity processes. A case study is conducted to examine the strategic planning and management of a call center to illustrate that a commodity process, such as handling customers’ complaints and enquiries, can be transformed into a core competence, if a clear strategic intent is arti...
The present work examined whether secrets are experienced as physical burdens, thereby influencing perception and action. Four studies examined the behavior of people who harbored important secrets, such as secrets concerning infidelity and sexual orientation. People who recalled, were preoccupied with, or suppressed an important secret estimated hills to be steeper, perceived distances to be f...
A relation between two secrets, known in the literature as nondeducibility, was originally introduced by Sutherland. We extend it to a relation between sets of secrets that we call independence. This paper proposes a formal logical system for the independence relation, proves the completeness of the system with respect to a semantics of secrets, and shows that all axioms of the system are logic...
Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.’s password-based authentication scheme [1] assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in [2,8] show t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید