Showing 361 - 380 results of 1,510 for search '"collusion"', query time: 0.74s Refine Results
  1. 361
  2. 362
    by Fu-Wen Chen, 陳福文
    Published 2002
    ..., the ownership and the manager. Especially, the problem regarding to auditor and manager''s collusion...
    Get full text
    Others
  3. 363
    by Junfeng Tian, Yue Li
    Published 2021-01-01
    ... on independent attacks for friend search engines while ignoring the more complicated collusion attacks, which can...
    Get full text
    Article
  4. 364
    by Ling Chi, Liang Hu, Hongtu Li, Jianfeng Chu
    Published 2014-03-01
    ... that the resistance of collusion attacks is weak. After analyzing, we proved that we can obtain the session key via...
    Get full text
    Article
  5. 365
    by Huse, Cristian
    Published 2008
    ... product markets. Tacit collusion plays an important role in merger policy: competition agencies sometimes...
    Get full text
  6. 366
    by 黃宜婷
    Published 2011
    ... the price of petroleum at the same range and time. This behavior is similar to tacit collusion. Besides...
    Get full text
    Others
  7. 367
    by Ruei-Che Huang, 黃睿哲
    Published 2005
    ... the communication content by the collusion with some others. The efficiency is to achieve the lower cost...
    Get full text
    Others
  8. 368
    by Allen Shi, 施彥任
    Published 2006
    .... One collusion method is to take parts from different legal copies and pieced them together to form a...
    Get full text
    Others
  9. 369
    by Hongying Zheng, Jieming Wu, Bo Wang, Jianyong Chen
    Published 2017-01-01
    ... different update parameters for different accessors to effectively resist both accessor collusion...
    Get full text
    Article
  10. 370
    by Man-Chen Wu, 吳曼甄
    Published 2015
    ... that other non-authorized parties execute App . We called collusion attack, and these non-authorized parties...
    Get full text
    Others
  11. 371
    by Newton, Derrick
    Published 2012
    ... for these properties. The collusion metric is introduced as a simple indicator as to the resistance of a workflow-based...
    Get full text
  12. 372
    by Yi-Chun Hsu, 徐逸鈞
    Published 2019
    ... to collusion attacks. The relationship of the factor fingerprint overlapped which resulted in a large number...
    Get full text
    Others
  13. 373
    by Zou, Kailin
    Published 2014
    ... are switching costs, collusion, and the competitive conditions in the Hong Kong banking sector during the period...
    Get full text
  14. 374
    by Hong-Ming Chen, 陳鴻明
    Published 2015
    ... relationship often presents negative image in general. Issues like Business-Government Collusion is easily...
    Get full text
    Others
  15. 375
    by Jung Han-Seung, Lee Young-Yoon, Lee Sang Uk
    Published 2004-01-01
    ... averaging, frame-rate change, frame shuffling or collusion attacks, as well as those of still images. Also...
    Get full text
    Article
  16. 376
    Get fulltext
    Article
  17. 377
    by Houeida Hedfi, Ahlem Dakhlaoui
    Published 2020-01-01
    ... electrical system under different industrial organization: monopoly, Cournot competition and collusion; under...
    Get full text
    Article
  18. 378
    by Saša Šegvić
    Published 2009-01-01
    ... been seized by the ever increasing and more intensive collusion of organised crime and terrorism...
    Get full text
    Article
  19. 379
    by Han, Tien Der, 韓天德
    Published 2006
    ... to make the highest profits when there is no sanction. When the externality of collusion is viewed...
    Get full text
    Others
  20. 380
    by Shu-chi Chang, 張舒綺
    Published 2012
    ...-serving motives and agents of interest arising from collusion. Due to inside directors is based on legal...
    Get full text
    Others