نتایج جستجو برای: is called trade secret however
تعداد نتایج: 7611914 فیلتر نتایج به سال:
Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available – correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. ...
In Shamir’s (t, n) threshold secret sharing scheme, one secret s is divided into n shares by a dealer and all shares are shared among n shareholders, such that knowing t or more than t shares can reconstruct this secret; but knowing fewer than t shares cannot reveal any information about the secret s. The secret reconstruction phase in Shamir’s (t, n) threshold secret sharing is very simple and...
In this paper, we propose a novel identity-based random key pre-distribution scheme called the identity based key pre-distribution using a pseudo random function (IBPRF), which has better trade-off between communication overhead, network connectivity and resilience against node capture compared to the other existing key predistribution schemes. IBPRF always guarantees that no matter how many se...
This article discusses what ethicists have called “unacceptable trade-offs” in health policy choices related to universal health coverage (UHC). Since the fiscal space is constrained, trade-offs need to be made. But some trade-offs are unacceptable on the path to universal coverage. Unacceptable choices include, among other examples from low-income countries, to expand coverage for services wit...
abstract the aim of this study was threefold: (1) to investigate the relationship between knowledge of semantic prosody and efl learners general language proficiency; (2) to examine the relationship between qualitative as well as quantitative knowledge of words, and (3) to compare the performance of efl learner on receptive and productive measures of semantic prosody. the study is based on a...
the ability to speak two languages in the world is a remarkable achievement. there is a good reason to believe that bilingualism is the norm for the majority of people in the world because 70% of the earth’s population are supposed to be bilingual or multilingual. various investigations have shown that the native language impacts foreign word recognition, and this influence is adapted by the de...
Abstract In academic discourse it has been pointed out that many European courts do not pay sufficient attention to assessing the proportionality of patent law remedies. Article 3 Enforcement Directive (IPRED), which harmonizes remedies for all intellectual property rights (IPRs), requires be proportionate. However, seems this requirement is often overlooked, with more being paid rest Art. 3, n...
In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...
ELECT Pilot power allocation is investigated under the framework of physical layer secure communications in time-division duplex systems, where the secret keys are generated from the estimates of sparse wireless channels. The joint optimisation of secret key capacity and sparse channel estimation performance based on pilot power allocation is formulated as a convex optimisation problem. Conside...
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید