نتایج جستجو برای: shares

تعداد نتایج: 20417  

Journal: :اقتصاد و توسعه کشاورزی 0
اتقایی کردکلایی اتقایی کردکلایی کاوسی کلاشمی کاوسی کلاشمی اسماعیلی اسماعیلی

abstract present study used translog cost function for determining break point of paddy farms. requested data set include inputs’ prices and quantities, and production amounts had been acquired from 500 rice farmers of guilan province at 2009. model used in this study is seemingly unrelated regressions (sur). the results showed that labor and pesticides had the highest and lowest share of produ...

2012
Ranga Reddy

Visual Cryptography facilitates hiding a secret image into n number of shares distributed to n number of participants. This kind of scheme is very useful as the participants in such security systems need not know the cryptographic knowledge in order to recover the secret image from the shares. This phenomenon is known as VCS (Visual Cryptography Scheme). An extended VCS is the one which is capa...

2010
Mustafa Ulutas Panos Liatsis

This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noiselike meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers’ attention. Previous works in the field focus on either increasing number of secrets or creating meaningful ...

2002
James S. Ang James C. Brau

We study a known negative signal, the sale of insider shares in an IPO and find that insiders adopt two concealment strategies consistent with wealth-maximizing behavior. First, insiders underreport the number of personally owned shares in the prominent original prospectus and use an obscure amendment to communicate the true higher level of shares to be offered. Second, when insiders increase s...

1999
John M. Cozzolino Peter J. Mikolaj

The application of utility theory to insurance is incomplete without the inclusion of the structure of risk sharing; to limit the use of utility to accept or reject decisions misses its power to explain the real world of excess insurance and reinsurance. The fine subdivision of risk which is routinely achieved bv insurance institutions can be explained on this basis. Practica1 methods of evalua...

2013
John Lynham

A unique database was created that describes the methods used to allocate shares in nearly every major catch share fishery in the world. Approximately 54% of the major catch share fisheries in the world allocated the Total Allowable Catch (TAC) solely on the basis of historical catch records, 3% used auctions, and 6% used equal sharing rules. The remaining 37% used a combination of methods, inc...

Journal: :IACR Cryptology ePrint Archive 2016
Jean-Sébastien Coron Aurélien Greuet Emmanuel Prouff Rina Zeitoun

We describe a new technique for improving the efficiency of the masking countermeasure against side-channel attacks. Our technique is based on using common shares between secret variables, in order to reduce the number of finite field multiplications. Our algorithms are proven secure in the ISW probing model with n > t + 1 shares against t probes. For AES, we get an equivalent of 2.8 nonlinear ...

2015
Anisha Maria Coelho Prabhu

Visual Cryptography (VC) is a special type of encryption technique where an image or document is encrypted by breaking it down into shares. These shares are then printed on transparencies. Decryption is done by superimposing the shares. Thus one can visually decode the secret image without computation. However, this property makes VC insecure as a third party can easily retrieve the secret info...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید