نتایج جستجو برای: is called trade secret however

تعداد نتایج: 7611914  

Journal: :The Musical Times and Singing Class Circular 1897

2012
Ronald S. Wynn

Your former employee recently joined a competitor. Email records confirm that he transferred technology or customer files to his home computer before his abrupt resignation. Other evidence suggests actual–or the threat of–trade secret misappropriation. No company wishes the distraction, expense, and uncertainty that typically accompany litigation. But litigation may be the most effective means–...

Journal: :Quantum Information Processing 2015
Paul Zhang Ryutaroh Matsumoto

Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together however, no information about the secret can be revealed. In quantum ramp secret sharing, partial inf...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده ادبیات 1390

in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...

2015
Sheryl E. Kimes Paul E. Wagner SHERYL E. KIMES PAUL E. WAGNER

Make sure that your revenue-management system is safe from trade-secret piracy.

Journal: :Expert Syst. Appl. 2010
Wen-Jan Chen Chin-Chen Chang T. Hoang Ngan Le

Keywords: LSB steganography Stego-image Image steganalysis Hybrid edge detection a b s t r a c t Steganography is the art and science of hiding data into information. The secret message is hidden in such a way that no one can apart from the sender or the intended recipient. The least significant bit (LSB) substitution mechanism is the most common steganographic technique for embedding a secret ...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

2002
Kamil Kulesza Zbigniew Kotulski

Secret sharing allows split control over the secret. Secret parts known as secret shares are distributed to different shareholders (locations). Secret can be recovered upon combination of sufficient number of shares. Research into theoretical foundations, development of widespread applications, as well as, new attacks resulted in great need for extra features of existing schemes. We describe ex...

Journal: :Education Review 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید