نتایج جستجو برای: shares

تعداد نتایج: 20417  

2010
Priyanka Koneru

In secret sharing scheme, the master secret and all the private shares (which are distributed by the dealer to the shareholders) are the two secrets which are to be maintained confidentially. In all the secret sharing schemes proposed till date, private shares are reused to reconstruct the master secret. But we proposed a new way of Proactive Secret Sharing Scheme in which, instead of renewing ...

2004
Martin Holmén Eugene Nivorozhkin

Some studies have provided evidence that dual class shares reduce firm market value. Other studies have shown that dual class shares are more common in countries where the proxies for private benefits of control are low. In this paper we explore whether the negative relation between firm market value and dual class shares can be explained by lower takeover probability. For family controlled fir...

Mohammad Kavoosi Kalashami Mohammad Reza Pakravan

In this study, the situation of Iran, U.S and Turkey's Pistachio export is investigated. to this purpose, Revealed Comparative Advantage (RCA) Index is calculated based on Agricultural and total economy export, separately, then forecasted by using Auto- Regressive Integrated Moving Average (ARIMA) approached, for 2008-2013. The results show that considering both commodity baskets, Turkey and Ir...

2009
Changlu Lin Lein Harn Dingfeng Ye

In a (t,n) secret sharing scheme, a mutually trusted dealer divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret, but fewer than t shares cannot reconstruct the secret. When there is no mutually trusted dealer, a (n,t,n) secret sharing scheme can be used to set up a (t,n) secret sharing because each shareholder also acts as a dealer to decide ...

Journal: :Security and Communication Networks 2013
Yan-Xiao Liu Yuqing Zhang Lein Harn Yu-pu Hu

Symmetric polynomial-based key distribution scheme has been widely adopted in various communication applications. This type of key distribution consists of a server and a set of users, where the server is responsible to distribute shares for each user via a symmetric polynomial. Based on the property of symmetry of this polynomial, each pair of users can compute a common secret key using their ...

Journal: :Journal of Economic Dynamics and Control 2000

Journal: :The Australian Journal of Agricultural and Resource Economics 2006

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید