نتایج جستجو برای: intended to re
تعداد نتایج: 10652479 فیلتر نتایج به سال:
As a means of clarifying the memory dynamics that underlie retrieval-induced forgetting, we explored how instructing participants either to remember or to forget a previously presented list of items influences the susceptibility of those items to inhibition. According to the inhibitory account of retrieval-induced forgetting, it is the items that interfere most with retrieval practice that shou...
Golle et al recently introduced universal re-encryption, defining it as re-encryption by a player who does not know the key used for the original encryption, but which still allows an intended player to recover the plaintext. Universal re-encryption is potentially useful as part of many information-hiding techniques, as it allows any player to make ciphertext unidentifiable without knowing the ...
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. Proxy re-encryption has found many practical applications, such as encrypted email forwarding, secure distributed file systems, and outsourced filtering of encrypted spam. In ACM CCS’07, Ca...
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. Song Luo, Jianbin Hu, and Zhong Chen presented a novel ciphertext policy attribute-based proxy re-encryption (CP-AB-PRE) scheme. The ciphertext policy realized in their scheme is ANDgates policy supporting multi-value attributes, ne...
Investigated was whether children would re-enact what an adult actually did or what the adult intended to do. In Experiment 1 children were shown an adult who tried, but failed, to perform certain target acts. Completed target acts were thus not observed. Children in comparison groups either saw the full target act or appropriate controls. Results showed that children could infer the adult's in...
We introduce a framework for finding preference information to derive desired conclusions in nonmonotonic reasoning. A new abductive framework called preference abduction enables us to infer an appropriate set of priorities to explain the given observation skeptically, thereby resolving the multiple extension problem in the answer set semantics for extended logic programs. Preference abduction ...
A proxy re-encryption (PRE) scheme allows a designated proxy, that has beforehand received a so-called re-encryption key, to translate a ciphertext intended to one user to a ciphertext intended to another one. Traditionally, the re-encryption key is generated at the initiative of the initial receiver and ideally, no secret keys should be known to the proxy. Such scheme is said unidirectional if...
As the biodiversity crisis accelerates, stakes are higher for threatened plants and animals. Rebuilding health of our planet will require addressing underlying threats at many scales, including habitat loss climate change. Conservation interventions such as protection, management, restoration, predator control, translocation, genetic rescue, biological control have potential to help or endanger...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید