نتایج جستجو برای: is called trade secret however
تعداد نتایج: 7611914 فیلتر نتایج به سال:
The notion of proprietary certificates [7] was recently introduced in an attempt to discourage sharing of access rights to subscription-based resources. A proprietary certificate is a certificate on a public key – the so-called proprietary key – that contains some information related to another (so-called collateral) certificate and has the property that if the owner of the proprietary public k...
Steganography is the process of concealing data within another data. The data may be in any form such as file, image, audio or video. The data to be concealed into another data is called secret data. The original data is called as cover data that hides the secret data. In this paper, an efficient steganography technique is presented which combine the visual cryptography with Least Significant B...
the hypothesis is that recent and frequent exposure to lexical items leads to a more fluent production of speech in terms of rate of speech. to test the hypothesis , a one- way anova experimental design was carried out. 24 senior student of efl participated in a one-way interview test. data analyses revealed that those who were exposed frequently to the lexical items over a week prior to inte...
A secret sharing scheme divides a secret into multiple shares by a dealer and shared among shareholders in such a way that any authorized subset of shareholders can reconstruct the secret; whereas any un-authorized subset of shareholders cannot recover the secret. If the maximal length of shares is equal to the length of the secret in a secret sharing scheme, the scheme is called ideal. If the ...
A new type of secret sharing scheme [2] called VSS scheme, was first introduced by Naor and Shamir in 1994. The key features of the VSS scheme are that encodes a secret image is encoded into shadow images (called shares) and the decoder does not need knowledge of cryptography or cryptographic computations, but only the “eyes” of a human being. To decrypt the secret image, the reader should copy...
In the multiterminal secret key agreement problem, a set of users want to discuss with each other until they share a common secret key independent of their discussion. We want to characterize the maximum secret key rate, called the secrecy capacity, asymptotically when the total discussion rate goes to zero. In the case of only two users, the capacity is equal to the Gács–Körner common informat...
This study aims to find evidence on trade secret disputes and settling in Indonesia. research was conducted because there are many Indonesia at this time, secrets have an essential role the field of intellectual property rights, then same important position as copyrights, trademarks, designs. Global economic competition requires protection create a healthy dynamic environment. legal is included...
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. Dealer distribute shares of a secret value among n participants. Gathering t(≤ n) participants, a secret value can be reconstructed. This is called a (t, n) secret sharing scheme. This scheme is based on Lagrange’s interpolation formula. As regard interpolation formula, it is known not only Lag...
Secret sharing schemes are methods designed to share a secret among a group of participants in such a way that the secret can be reconstruct only by specified groups of participant, if non-allowed coalitions cannot obtain any information about the secret. Then the scheme is said to be perfect. Let P = {p1, p2, . . . , pn} be the set of players. The family of qualified subsets Γ ⊆ 2 is called th...
Visual secret sharing scheme (VSSS) is a secret sharing method which decodes the secret by using the contrast ability of the human visual system. Autostereogram is a single two dimensional (2D) image which becomes a virtual three dimensional (3D) image when viewed with proper eye convergence or divergence. Combing the two technologies via human vision, this paper presents a new visual secret sh...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید