Results 51 to 60 of about 321,364 (156)

Automated Cryptographic Analysis of the Pedersen Commitment Scheme

open access: yes, 2017
Aiming for strong security assurance, recently there has been an increasing interest in formal verification of cryptographic constructions. This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its ...
Dong, Changyu, Metere, Roberto
core   +1 more source

Knowledge hiding and knowledge hoarding: A systematic literature review

open access: yesKnowledge and Process Management, 2021
The present study aims to present a consolidated view of the quantitative research on Knowledge Hiding (KHi) and Knowledge Hoarding (Kho), and the relationship with Knowledge Sharing (KS), and propose guidelines for future research. A systematic literature review was adopted, following rigorous procedures.
Mírian Oliveira   +2 more
openaire   +2 more sources

Anonymity and Information Hiding in Multiagent Systems [PDF]

open access: yes, 2003
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework ...
Halpern, Joseph Y., O'Neill, Kevin R.
core   +6 more sources

Load Hiding of Household's Power Demand [PDF]

open access: yes, 2014
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik   +2 more
core   +1 more source

Unified Description for Network Information Hiding Methods

open access: yes, 2016
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech   +2 more
core   +2 more sources

Steganography: a Class of Algorithms having Secure Properties [PDF]

open access: yes, 2011
Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated.
Bahi, Jacques M.   +2 more
core   +1 more source

Developing social action capabilities in a humanoid robot using an interaction history architecture [PDF]

open access: yes, 2008
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Dautenhahn, K.   +3 more
core   +1 more source

A contrast-sensitive reversible visible image watermarking technique [PDF]

open access: yes, 2009
A reversible (also called lossless, distortion-free, or invertible) visible watermarking scheme is proposed to satisfy the applications, in which the visible watermark is expected to combat copyright piracy but can be removed to losslessly recover the ...
Li, Chang-Tsun   +4 more
core   +1 more source

Dark triad and knowledge hiding in firms: Mediating role of perceived organizational politics

open access: yesActa Psychologica
Negative behaviors at the workplace always disturb the management of the firms. This research investigates the link between the dark triad and various types of Knowledge hiding (Evasive hiding, Playing dumb, and Rationalized hiding) in firms. In addition,
Yiyu Wang   +3 more
doaj   +1 more source

Personality Traits, Knowledge-Hiding Behavior and Job Performance of Employees

open access: yesFoundations of Management
The banking sector is knowledge intensive and faces increasing competitive pressure. Knowledge hiding can undermine job performance and erode an organization’s competitive advantage.
HANG Nga Nguyen THI, KIM Nam Nguyen
doaj   +1 more source

Home - About - Disclaimer - Privacy