نتایج جستجو برای: authorized exploiters
تعداد نتایج: 6369 فیلتر نتایج به سال:
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system para...
If a secret key or a password is to be used in an application, where multi users are involved, then it is better to share the key or the password to all the authorized users in such a way that a minimum or all the shares of the users put together must result in the key or the password. This method avoids the unauthorized access to the information by a single user with out the knowledge of the o...
We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...
Focusing on the organizing practices by which vulnerable individuals are exploited for their labor, we build a model that depicts how human traffickers systematically target impoverished girls and women transform autonomous objection into unquestioned compliance. Drawing from qualitative interviews with forced labor in sex industry, traffickers, brothel managers, other sources (e.g., doctors, n...
We investigate COVID-19 as a disabling and an enabling mechanism for small mid-size enterprises (SMEs), particularly how SMEs’ crisis strategies might help them through the crisis. SMEs can follow retrenchment strategy, persevering or innovation they do so narrowly broadly. Using representative sample of Danish SMEs, we test are associated with turnover expectations. find distinct differences i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید