Showing 941 - 960 results of 1,510 for search '"collusion"', query time: 0.53s Refine Results
  1. 941
    ..., although we cannot reject collusion or behaviors generated by online auctions....
    Get full text
    Others
  2. 942
    by Whitney, Justin D
    Published 2005
    .... In colluding with malicious nodes, well behaved nodes risk losing privileges gained over time; collusion...
    Get full text
    Get full text
    Others
  3. 943
    by Wright, Rebecca
    Published 2017
    ... neglecting socio-political contexts. The emerging themes include: collusion, power, influence...
    Get full text
  4. 944
    by Kabemba, Claude Kambuya
    Published 2011
    ... resources that are fuelled by regional and international actors in collusion with local actors. The thesis...
    Get full text
    Others
  5. 945
  6. 946
    by Caihua Zhou
    Published 2021-04-01
    ... of the central government, the local government, and the third-party enterprise is designed around the collusion...
    Get full text
    Article
  7. 947
    by Dezhi An, Yan Li, Shengcai Zhang, Jun Lu
    Published 2020-01-01
    ... one cloud server and can thus avoid collusion attack. Further, we achieve an efficient and secure...
    Get full text
    Article
  8. 948
    by Qianqian Su, Rui Zhang, Rui Xue, Pengchao Li
    Published 2020-01-01
    ... that the proposed scheme is unforgeable, collusion resistant and privacy-preserving. Finally, we evaluate...
    Get full text
    Article
  9. 949
    by Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou
    Published 2020-01-01
    ... under existential unforgeable in the random oracle model as well as the security against collusion...
    Get full text
    Article
  10. 950
    by Yan Yang, Xingyuan Chen, Hao Chen, Xuehui Du
    Published 2018-01-01
    ... multiauthority ABE systems that do not rely on a central authority, collusion resistance can be achieved using a...
    Get full text
    Article
  11. 951
    by Fei Tang, Shuai Ma, Yong Xiang, Changlu Lin
    Published 2019-01-01
    ...-based signature scheme with multiple authorities which can resist collusion attack out of N from N-1...
    Get full text
    Article
  12. 952
    by Guler, Kemal
    Published 1990
    ... to collude under first and second price auctions and find that equilibrium patterns of collusion differ...
    Get full text
    Get full text
    Others
  13. 953
    by Lee, Daesik
    Published 2015
    ...We consider the applicability of the Revelation Principle under the possibility of collusive...
    Get full text
    Others
  14. 954
    by Halilul Khairi
    Published 2018-11-01
    ... for collusion to happen between NGOs and corruptors. However, in practice, the role of NGOs can become elitist...
    Get full text
    Article
  15. 955
    by Qixu Wang, Dajiang Chen, Ning Zhang, Zhe Ding, Zhiguang Qin
    Published 2017-01-01
    ... technology cannot protect the system privacy when facing a possible collusion attack. In this paper, we...
    Get full text
    Article
  16. 956
  17. 957
    by Buckham, Carmel J.
    Published 2015
    ... agreements in fact amounted to collusion by dividing and controlling markets. The value in this research...
    Get full text
    Get full text
  18. 958
    by Zhou Lian, 周蓮
    Published 2019
    ... of collusion between management and accountants. Finally, at the end of this paper I bring forth some...
    Get full text
    Others
  19. 959
    ...Dwight Eisenhower once warned of an insidious collusion between industry and government...
    Get full text
    Others
  20. 960
    by Wenhua Gao, Li Yang
    Published 2021-01-01
    ... and that there is no collusion between any of the three parties in the protocol. Compared with current election protocols...
    Get full text
    Article