نتایج جستجو برای: secrecy of know how
تعداد نتایج: 21242317 فیلتر نتایج به سال:
as polysemy is encountered frequently in english as foreign language. fl learners’ ability to disambiguate polysemous verbs becomes critical to their comprehension in the target language. this thesis, accordingly, investigated how iranian efl learners achieved comprehension of english polysemous verbs by using three different types of cues: (1) elaborated context, (2) semantic frames, and (...
Most voting schemes rely on a number of authorities. If too many of these authorities are dishonest then voter privacy may be violated. To give stronger guarantees of voter privacy Kiayias and Yung [1] introduced the concept of elections with perfect ballot secrecy. In this type of election scheme it is guaranteed that the only thing revealed about voters’ choices is the result of the election,...
A b s t r a c t. In recent work the notion of a secrecy logicS over a given deductive system S was introduced. Secrecy logics capture the essential features of structures that are used in performing secrecy-preserving reasoning in practical applications. More precisely, they model knowledge bases that consist of information, part of which is considered known to the user and part of which is to ...
H ow do you know if your patient improves with any particular therapy? In the treatment of patients with vision threatening uveitis, the primary goal of therapy is far from universally accepted. Should the end point be improvement in visual acuity? An obvious choice but flawed since many patients benefit without a discernable change in acuity measurements. Cataract and macular scars can limit t...
This paper gives a novel approach to verify the secrecy property of cryptographic protocols under equational theories. Indeed, by using the notion of interpretation functions, this paper presents some sufficient and practical conditions allowing to guarantee the secrecy property of cryptographic protocols under any equational theory. An interpretation function is a safe means by which an agent ...
in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید