نتایج جستجو برای: is called trade secret however

تعداد نتایج: 7611914  

2007
Kun Peng Ed Dawson

Bid opening in sealed-bid e-auction is efficient when a homomorphic encryption algorithm is employed to seal the bids and homomorphic bid opening is employed to open the bids. Such e-auction schemes are called homomorphic auctions. However, high efficiency of homomorphic auctions is based on an assumption: the bids are valid (e.g. within a special range). An undetected invalid bid can compromis...

Journal: :IACR Cryptology ePrint Archive 2005
Kun Peng Colin Boyd Ed Dawson

Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g. within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verifi...

Journal: :Discrete Mathematics, Algorithms and Applications 2023

The AB Game is a game similar to the popular Mastermind. We study version of this called Static Black-Peg Game. It played by two players, codemaker and codebreaker. creates so-called secret placing color from set [Formula: see text] colors on each pegs, subject condition that every used at most once. codebreaker tries determine asking questions, where all questions are given once question possi...

2012
Tapasi Bhattacharjee

Secret sharing method divides a secret into some components called shadow images where each shadow image looks meaningless. Based on this idea, we propose a simple secret image sharing scheme in this article. This scheme is based on bitwise operations. We have used matrix addition and subtraction processes for share generation and reconstruction processes respectively. This technique allows a s...

Journal: :IACR Cryptology ePrint Archive 2015
Masoumeh Safkhani Nasour Bagheri Mehdi Hosseinzadeh Mojtaba Eslamnezhad Namin Samad Rostampour

Recently,Wang et al. analyzed the security of two EPC C1-G2 compliant RFID authentication protocols, called RAPLT and SRP, and proved that these protocols are vulnerable against de-synchronization and secret disclosure attacks. The time complexity of their attacks were O(2). In addition, they proposed an improved version of SRP entitled SRP, for which they claim the security would be O(2). Howe...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد علوم دارویی - پژوهشکده علوم 1392

purpose a metabolic abnormality such as obesity is a major obstacle in the maintenance of the human health system and causes various chronic diseases including type 2 diabetes, hypertension, cardiovascular diseases, as well as various cancers. this study was designed to summarize the recent scientific knowledge regarding the anti-obesity role of curcumin (diferuloylmethane), which is isolated f...

2014
Richard J. Smith RICHARD J. SMITH

For centuries the nations and principalities of the world have engaged in trading schemes to boost exports. Conquest, protection of domestic supply through tariffs and eroding domestic currency are all part of the historic policy harem. The United States has a foreign trade zone program. Who knew? FTZs evoke images of women locked inside a dark sweatshop in a jungle making hoodies for football ...

2015
Masoumeh Safkhani Mehdi Hosseinzadeh Mojtaba Eslamnezhad Namin Samad Rostampour Nasour Bagheri

Recently,Wang et al. analyzed the security of two EPC C1-G2 compliant RFID authentication protocols, called RAPLT and SRP, and proved that these protocols are vulnerable against de-synchronization and secret disclosure attacks. The time complexity of their attacks were O(2). In addition, they proposed an improved version of SRP entitled SRP, for which they claim the security would be O(2). Howe...

2010
Guido Bertoni Joan Daemen Michaël Peeters Gilles Van Assche

In this paper we report on Keccak implementations that offer a high level of resistance against power analysis by using the technique of masking (secret sharing). In software, we show that two shares are required and if implemented carefully, sufficient. In dedicated hardware, three shares are required. We show that Multi-Gbit/s. throughput can be obtained with cores of area around 100 KGates. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پایه 1391

bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید