نتایج جستجو برای: is called trade secret however
تعداد نتایج: 7611914 فیلتر نتایج به سال:
We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential differ...
To guarantee that some implementation of a cryptographic scheme is secure against side channel analysis, one needs to formally prove its leakage resilience. A relatively recent trend is to apply methods pertaining to the field of Multi-Party Computation: in particular this means applying secret sharing techniques to design masking countermeasures. It is known besides that there is a strong conn...
In this paper, an efficient multi-objective model is proposed to solve time-cost trade off problem considering cash flows. The proposed multi-objective meta-heuristic is based on Ant colony optimization and is called Non Dominated Archiving Ant Colony Optimization (NAACO). The significant feature of this work is consideration of uncertainties in time, cost and more importantly interest rate. A ...
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
T his study investigates the effects of extra-ECOWAS merchandise trade and investment flows on the transmission of business cycles in the selected ECOWAS between 1985 and 2014. The study finds that total trade and foreign direct investment (FDI) significantly influence the transmission of business cycles with elasticities of 1.1 and 0.7, respectively in the long run. There are little vari...
This paper is an empirical attempt to investigate bilateral trade flow between Iran and Russia. To this end, we used statistical analyses on macroeconomic series over the period of 1991-2017. Results revealed that there is a significant statistical difference in terms of exports between Iran and Russia, and that there has always been a buyer-seller dialogue between the two countries. According ...
In this work we focus on two basic secure distributed computation tasksProbabilistic Weak Secret Sharing (PWSS) and Probabilistic Verifiable Secret Sharing (PVSS). PVSS allows a dealer to share a secret among several players in a way that would later allow a unique reconstruction of the secret with negligible error probability. PWSS is slightly weaker version of PVSS where the dealer can choose...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید