Showing 381 - 400 results of 1,510 for search '"collusion"', query time: 0.82s Refine Results
  1. 381
    by Chian-An Lo, 駱建安
    Published 2016
    ... authentication. However this scheme has high risk of suffer collusion attack. Authorized users can share personal...
    Get full text
    Others
  2. 382
    by Cano Tacza, Karenn Norely
    Published 2021
    ... o perjuicio patrimonial para imputar a los procesados el delito de colusión agravada. === Collusion...
    Get full text
    Others
  3. 383
    by Wang, Jun
    Published 2011
    ... monitoring and collusion effect's. Measuring the MLSS by the size of shareholding of the NCLS .relative...
    Get full text
  4. 384
    by Ming-Fuu Lin, 林明甫
    Published 2005
    ... to the collusion attack. We will analysis the possible collusion attack on the scheme proposed by Sherman...
    Get full text
    Others
  5. 385
    by Subrata Saha, Izabela Nielsen, Shib Sankar Sana
    Published 2021-01-01
    ... of vertical integration and strategic collusion from the perspective of green supply chain practice...
    Get full text
    Article
  6. 386
    by Eriksson, Rickard
    Published 2001
    ... in demand affect the possibility of maintaining implicit collusion. Cyclical changes in the intensity...
    Get full text
    Get full text
    Doctoral Thesis
  7. 387
    by Yu-Chih Wei, 魏銪志
    Published 2013
    ... privacy enhanced scheme, fast forwarded malicious message and collusion attacks are all the outstanding...
    Get full text
    Others
  8. 388
    by Kalozymis, Ioannis
    Published 2014
    ... analysis, its link with tacit collusion and the judgments that have formulated the conditions that must...
    Get full text
  9. 389
    by Salgado Banda, Héctor
    Published 2004
    ... to other studies, it is shown that collusion may accelerate competition. The thesis consists of five...
    Get full text
  10. 390
    by Syarif Syahrial
    Published 2006-09-01
    ... and collusion between central and local government. The result conform the significance of political pressure...
    Get full text
    Article
  11. 391
    by Chen, Chiung-Hsun, 陳烱勳
    Published 2012
    ... eavesdropping attacks, forged attacks, dropping attacks, and collusion attacks. To utilize these attacks...
    Get full text
    Others
  12. 392
    by chih-kuang Kao, 高志光
    Published 2010
    ... should be imperceptible and can resist collusion attacks. The colluder may combine several copies...
    Get full text
    Others
  13. 393
    by Zhang, Ping
    Published 2006
    ... of IPO auctions and show that when demand is discrete the tacit collusion equilibrium is obtained under a...
    Get full text
  14. 394
    by Singh, Gaurav (Gaurav J.)
    Published 2017
    ... at bounded-collusion functional encryption, where the number of keys for which security is guaranteed...
    Get full text
    Others
  15. 395
    by Simbanegavi, Witness
    Published 2005
    ... collusion on advertising even though advertising is only informative. If so, will this enhance or lower...
    Get full text
    Get full text
    Doctoral Thesis
  16. 396
    by Ssu-Han Chen, 陳思翰
    Published 2013
    ... advertisement. At last, we discuss (4) the collusion of platform and advertiser. It leads the collusion profit...
    Get full text
    Others
  17. 397
    ... Authority (CADE) documents help to characterize the ethanol and gasoline retailers involved in the collusion...
    Get full text
    Article
  18. 398
    by Darong DAI, Kunrong SHEN
    Published 2014-01-01
    ... then give the corresponding conditions under which full collusion and partial collusion are established...
    Get full text
    Article
  19. 399
    by KO RU, 柯儒
    Published 2014
    ... Layer Collusion Tracker that is named as MLC Tracker. MLC Tracker checks Intent privilege to identify...
    Get full text
    Others
  20. 400
    by LIN ,Yu Jen, 林育任
    Published 2011
    ... of the collusion attacks. With being aware of topology information, the proposed TAKA (Topology Aware Key...
    Get full text
    Others