نتایج جستجو برای: is called trade secret however
تعداد نتایج: 7611914 فیلتر نتایج به سال:
Novel idea of hierarchical visual cryptography is stated in this paper. The key concept of hierarchical visual cryptography is based upon visual cryptography. Visual cryptography encrypts secret information into two pieces called as shares. These two shares are stacked together by logical XOR operation to reveal the original secret. Hierarchical visual cryptography encrypts the secret in variou...
Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between nodes. In order to use symmetric-key algorithms, two nodes need to establish a secret session key first. In this chapter, we describe a novel chord-based key establishment (CBKE) protocol that allows any pair of nodes in a...
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
this thesis examines the significances and implications of inflicted physical pain in waiting for the barbarians (1980) by john maxwell coetzee (1940 - ). the researcher tries to show how body becomes a site for exercising violence. in this way, the government’s representatives turn bodies of the barbarians into blank pages through torturing in order to create the truth of the empire. in this p...
Transmission is a major aspect in today’s world. A secret image looks like a selected targeted image will be transmitted for the security reasons. In this project secure image transmission technique is proposed, which transforms automatically a given large volume secret image into a so-called secret-fragment-visible mosaic image of the same size. The mosaic image looks like same as the target i...
Splitting a secret s between several participants, we generate (for each value of s) shares for all participants. The goal: authorized groups of participants should be able to reconstruct the secret but forbidden ones get no information about it. In this paper we introduce several notions of non-perfect secret sharing, where some small information leak is permitted. We study its relation to the...
a. Rationale for protection. The protection of confidential business information dates at least to Roman law, which afforded relief against a person who induced another's employee to divulge secrets relating to the master's commercial affairs. The modern law of trade secrets evolved in England in the early 19th century, apparently in response to the growing accumulation of technical know-how an...
In this paper, we study fundamental trade-offs in privacy-preserving biometric identification systems with noisy enrollment. The proposed include helper data, secret keys, and private keys. Helper data are stored a public database used for identification. Secret keys either secure or provided to the user, can be next step, e.g. authentication. Private by users, also impose enrollment channel an...
Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and distributes shares of the document to the storage servers. However, the users have to trust that a certain amount of storage servers behaves honestly and do not lose (retrievability) or reveal (co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید