نتایج جستجو برای: authorized exploiters

تعداد نتایج: 6369  

2010
Bo Qin Qianhong Wu Lei Zhang Josep Domingo-Ferrer

Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system para...

2012
P Devaki

If a secret key or a password is to be used in an application, where multi users are involved, then it is better to share the key or the password to all the authorized users in such a way that a minimum or all the shares of the users put together must result in the key or the password. This method avoids the unauthorized access to the information by a single user with out the knowledge of the o...

M. M. Shahmoradian, M. Marcokova O. V. Chernoyarov Y. E. Korchagin

We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...

Journal: :Journal of Management 2021

Focusing on the organizing practices by which vulnerable individuals are exploited for their labor, we build a model that depicts how human traffickers systematically target impoverished girls and women transform autonomous objection into unquestioned compliance. Drawing from qualitative interviews with forced labor in sex industry, traffickers, brothel managers, other sources (e.g., doctors, n...

Journal: :Journal of Business Venturing Insights 2021

We investigate COVID-19 as a disabling and an enabling mechanism for small mid-size enterprises (SMEs), particularly how SMEs’ crisis strategies might help them through the crisis. SMEs can follow retrenchment strategy, persevering or innovation they do so narrowly broadly. Using representative sample of Danish SMEs, we test are associated with turnover expectations. find distinct differences i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید