Suggested Topics within your search.
Suggested Topics within your search.
Collusion
5
History
3
Economics
2
Forecasting
2
Imperfect competition
2
Machine learning
2
QA75 Electronic computers. Computer science
2
Western philosophy, from c 1900 -
2
Algorithms
1
Algorithms optimizations
1
Alliance paradox
1
Analytical and numerical solutions
1
Annealing
1
Annealing algorithm
1
Anti-Corruption
1
Anti-collusion
1
BP neural networks
1
Bailouts
1
Bidding process
1
Buying-out
1
Cache placement
1
Cartel
1
Cartel game theory
1
Collusive interest flooding attack
1
Collusive interest flooding attack (CIFA)
1
Colonialism and imperialism
1
Commerce
1
Committees
1
Competition
1
Computer architecture
1
-
741“... cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously...”
Get full text
Article -
742by Sunarso Sunarso“... to eliminate cronyism and collusion: According to Law Na 22 of 1999 on Local Government, districts had full...”
Published 2015-10-01
Get full text
Article -
743“... for a collusion attack when using two servers. Moreover, our proposed algorithm can hide the base...”
Get full text
Article -
744by Caitlin Schroering“... that the privatization of water – led by global financial institutions working in collusion with governments...”
Published 2021-02-01
Get full text
Article -
745by Roberta Bassi“... of collusion and complicity in which several Mexican businessmen and politicians were involved. Both...”
Published 2020-11-01
Get full text
Article -
746by Vivianne Châtel“... collusion) de nombreux hommes de science aux différentes entreprises génodicaires pour se faire tentative...”
Published 2002-12-01
Get full text
Article -
747“... cost misreporting behavior and the collusion behavior of the platform operator, this paper built a...”
Get full text
Article -
748by Kostyantyn MALYSHENKO, Vadim MALYSHENKO, Elena Yu. PONOMAREVA, Marina ANASHKINA“... or implicit collusion at the stock market of Ukraine....”
Published 2019-06-01
Get full text
Article -
749“... collusion attacks. To balance the privacy and security of data publication, this scheme classifies users...”
Get full text
Article -
750“... kinds of attacks such as filtering, noising, compression, and frame collusion. Compared with several...”
Get full text
Article -
751“... can resist collusion attacks. We analyze the accuracy and security of our protocols in the semihonest...”
Get full text
Article -
752by Mercedes Rosúa“..., true dangers and a real collusion of wes- tern sectors-venal, corrupt, fainthearted and ignorant...”
Published 2007-09-01
Get full text
Article -
753by Bruce Johnson“... Idea' in 1928. During its season in Melbourne, collusion between the local yellow press tabloid Truth...”
Published 2010-01-01
Get full text
Article -
754“...This research related to the implementation of good governance, free from corruption, collusion...”
Get full text
Article -
755“... and ciphertext attacks, indistinguishability against keyword-guessing attacks and collusion resistance. We...”
Get full text
Article -
756by Mujibussalim Mujibussalim“... in mking decision, collusion or conspiracy between businessman and bureacrats and security and lack of law...”
Published 2010-12-01
Get full text
Article -
757by Anjar Nugroho“... that is not sensitive to human problems will merely legitimate illegal collusion. If fiqh does not insist on handling...”
Published 2005-08-01
Get full text
Article -
758“... can resist collusion attacks, spoofing attacks, and replay attacks and makes user revocation easier...”
Get full text
Article -
759Published 2013“...In the first chapter, we develop a dynamic model of collusion in city-pair routes for selected US...”
Get full text
Others -
760