نتایج جستجو برای: keeping the secrets

تعداد نتایج: 16055413  

Journal: :IACR Cryptology ePrint Archive 2005
Daniel R. L. Brown

A prompting protocol permits users to securely retrieve secrets with greater entropy than passwords. The retrieved user secrets can have enough entropy to be used to derive cryptographic keys.

1997
Stefan Brands

Note: The last sentence on page 3 is not entirely accurate, in that only the number of multiplications decreases by a factor of j; the number of squarings is unaaected. Abstract. Consider a polynomial-time prover holding a set of secrets. We describe how the prover can rapidly demonstrate any satissable boolean formula for which the atomic propositions are relations that are linear in the secre...

2003
Jeffrey B. Cheng Daniel L. Motola David J. Mangelsdorf David W. Russell

David W. Russell or David J. Mangelsdorf Department of Molecular Genetics Department of Pharmacology UT Southwestern Medical Center UT Southwestern Medical Center 5323 Harry Hines Blvd. 5323 Harry Hines Blvd. Dallas, Texas 75390-9046 Dallas, Texas 75390-9046 Tel. 214 648-2007 Tel. 214 648-6394 Fax. 214 648-6899 E-Mail: Fax 214 648-5419 E-Mail: [email protected] davo.mango@utsouth...

Journal: :Current Biology 2010
Nigel Williams

be hypothesised that adaptation to pollinators has been a driving force behind the diversification of some of the major elements of the southern African flora, " Johnson writes. Southern African flowers are known to be attractive to a range of species from long-probscid flies, oil-bees, hawkmoths, butterflies, birds and rodents. Many of these pollination interactions have been characterised in ...

2016
Sauvik Das Jason Hong Stuart Schechter

People sometimes require very strong passwords for high-value accounts (e.g., master passwords for password managers and encryption keys), but often cannot create these strong passwords. Assigning them provably strong secrets is one solution, and prior work has shown that people can learn these assigned secrets through rote learning, though learning the secrets takes some time and they are quic...

Journal: :JAMA: The Journal of the American Medical Association 1899

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

2006
YANG WEI LIUSHENG HUANG

Secure two-party protocols are of significant research and application value. All-or-Nothing Disclosure of Secrets (ANDOS) is such a kind of cryptographic task. It involves two parties, a vendor and a buyer. The vendor, say Alice, who disposes of several secrets and is willing to sell any of them to the buyer, say Bob, with the guarantee that no information about the other secrets will be obtai...

2010

a. Rationale for protection. The protection of confidential business information dates at least to Roman law, which afforded relief against a person who induced another's employee to divulge secrets relating to the master's commercial affairs. The modern law of trade secrets evolved in England in the early 19th century, apparently in response to the growing accumulation of technical know-how an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید