نتایج جستجو برای: keeping the secrets

تعداد نتایج: 16055413  

Journal: :Nature 1998

Journal: :Harvard business review 2016
Martine Haas Mark Mortensen

Over the years, as teams have grown more diverse, dispersed, digital, and dynamic, collaboration has become more complex. But though teams face new challenges, their success still depends on a core set of fundamentals. As J. Richard Hackman, who began researching teams in the 1970s, discovered, what matters most isn't the personalities or behavior of the team members; it's whether a team has a ...

Journal: :I. J. Network Security 2015
Bin Feng Cheng Guo Mingchu Li Zhi-Hui Wang

A proactive secret sharing scheme is a method of sharing a secret among a set of participants. And, the corresponding shadows can be periodically renewed under the premise of never changing the shared secret. However, in the most existing proactive secret sharing schemes, only one secret can be shared during one secret sharing process. The proposed scheme describes PMSS, a new way to share mult...

1999
JOACHIM BISKUP

A shared information system is expected to comply with the following potentially conflicting requirements. On the one side it should provide useful answers to arbitrary queries, while on the other side it should preserve certain secrets according to a security policy. We study and compare two previously suggested approaches to meet these requirements, namely refusal of statements and lying . Th...

2005
Vinayak Naik Anish Arora Sandip Bapat Mohamed Gouda

A challenge in resource-constrained sensor networks is to provide secure communication in an efficient manner, even in the presence of denial-of-service attacks. In this article, we present a simple protocol for secret maintenance between a pair of network neighbors. We claim that certain adversaries cannot compromise the current secret shared by the neighbors, nor can they cause the neighbors ...

Journal: :CoRR 2010
K. R. Sahasranand Nithin Nagaraj S. Rajan

This note analyses one of the existing space efficient secret sharing schemes and suggests vulnerabilities in its design. We observe that the said algorithm fails for certain choices of the set of secrets and there is no reason for preferring this particular scheme over alternative schemes. The paper also elaborates the adoption of a scheme proposed by Hugo Krawczyk as an extension of Shamir's ...

Journal: :Channels 2013

Journal: :IACR Cryptology ePrint Archive 2008
Abhishek Parakh Subhash C. Kak

This paper presents a recursive hiding scheme for 2 out of 3 secret sharing. In recursive hiding of secrets, the user encodes additional information about smaller secrets in the shares of a larger secret without an expansion in the size of the latter, thereby increasing the efficiency of secret sharing. We present applications of our proposed protocol to images as well as text.

Journal: :CoRR 2010
Sara Miner More Pavel Naumov

A collaboration network is a graph formed by communication channels between parties. Parties communicate over these channels to establish secrets, simultaneously enforcing interdependencies between the secrets. The paper studies properties of these interdependencies that are induced by the topology of the network. In previous work, the authors developed a complete logical system for one such pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید