intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Information leakage

Xem 1-13 trên 13 kết quả Information leakage
  • In this paper we suggest an information-leakage-free quantum dialogue protocol using three-qubit Greenberger–Horne–Zeilinger (GHZ) states of which two qubits travel forth and back between Alice and Bob.

    pdf16p vioracle 25-09-2023 3 2   Download

  • Methods for two distant parties to exchange their secret messages using single photons are considered. There existed several such methods but they are either insecure or face with information leakage problem. In this paper a new method to overcome the above-said limitations is proposed. The proposed method is also efficient because it also uses single photons in two degrees of freedom.

    pdf10p vispiderman 15-06-2023 4 2   Download

  • Concerns regarding inappropriate leakage of sensitive personal information as well as unauthorized data use are increasing with the growth of genomic data repositories. Therefore, privacy and security of genomic data have become increasingly important and need to be studied. With many proposed protection techniques, their applicability in support of biomedical research should be well understood.

    pdf9p vighostrider 25-05-2023 4 2   Download

  • In this paper, a unidirectional security gateway device is designed using optical fiber for unidirectional secure data transfer from high/low security network to low/high security network.

    pdf6p visherylsandberg 18-05-2022 12 2   Download

  • The presented algorithm has shown the accuracy of classification of the sequences specified in the work 0.98 and can be implemented in DLP systems to prevent the transmission of information in encrypted or compressed form.

    pdf8p chauchaungayxua12 11-05-2021 24 4   Download

  • This article presents the acquisition of electromagnetic emanating from the PS/2 keyboards through different paths (in space, through power line or via LAN cable). After acquisition we develop a program on MATLAB to recover the keystroke signal from data which is obtained in the near field of PS/2 keyboard.

    pdf10p vivirginia2711 09-12-2020 17 4   Download

  • As an effective solution to the tradeoff between array size and the number of antenna elements, dual polarization antenna is widely utilized in massive MIMO systems. However, existing channel state information (CSI) feedback schemes are not suitable for dual-polarized massive MIMO as they ignore the polarization leakage between the polarization directions, causing significant performance degradation. To facilitate accurate channel acquisition, this paper proposes a practical channel model for dual-polarized massive MIMO by taking polarization leakage into consideration.

    pdf12p son248 24-03-2020 12 1   Download

  • Module 6 - Network and information security and privacy. In the Information Age, information is an asset to be protected and policymakers need to know what information security is and how to take action against information leakage and infringement. This module provides an overview of the need for information security, information security issues and trends, and the process of formulating an information security strategy.

    pdf110p whocare_d 08-09-2016 46 1   Download

  • On opening the gate valve, the flow path is enlarged in a highly nonlinear manner with respect to percent of opening. This means that flow rate does not change evenly with stem travel. Also, a partially open gate disk tends to vibrate from the fluid flow. Most of the flow change occurs near shutoff with a relatively high fluid velocity causing disk and seat wear and eventual leakage if used to regulate flow. For ...

    pdf149p loixinloi 08-05-2013 35 4   Download

  • Concentrating ownership allows firms to limit their information disclosure to the public. Opacity is a good strategy because it prevents leakage of proprietary information to competitors and allows firms to avoid unwanted political or social scrutiny. Firms with proprietary knowledge and specific human capital tend to concentrate their ownership and decision rights in the individuals who possess the specific knowledge (Jensen and Meckling, 1992; Christie, Joye, and Watts, 1993).

    pdf49p bin_pham 06-02-2013 53 4   Download

  • The second argument is related to proprietary information and specific human capital. By concentrating ownership, decision rights can be given to individuals who possess specific knowledge (Jensen and Meckling, 1992; Christie, Joye, and Watts, 1993). One benefit of co-locating decision rights with specific knowledge is that the leakage of the specific knowledge to competitors is prevented and the transferring cost of the specific knowledge is avoided. This benefit is great in East Asia where political lobbying activities are common and lucrative.

    pdf42p bin_pham 06-02-2013 54 4   Download

  • This study examines the relations between earnings informativeness, measured by the earnings-return relation, and the ownership structure of 977 companies in seven East Asian economies. Our results are consistent with two complementary explanations. First, concentrated ownership and the associated pyramidal and cross-holding structures create agency conflicts between controlling owners and outside investors. Consequently, controlling owners are perceived to report accounting information for self-interested purposes, causing the reported earnings to lose credibility to outside investors.

    pdf200p bin_pham 06-02-2013 60 8   Download

  • The first item to discuss when talking about router security is the router’s operating system (OS). The OS on Cisco routers is called Internetworking Operating System, or IOS. Most routers will be running an IOS version between 11.x and 12.x. By the time this book is published,Cisco may have released 13.x. Every OS has vulnerabilities, and IOS is no exception. These vulnerabilities generally allow an attacker to disable a router (a denial of service attack),collect information from a router (information leakage), or reconfigure a router (an actual compromise)....

    pdf5p vinhnghi 27-08-2009 80 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2