Journal articles on the topic 'Secret contract'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secret contract.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhang, En, Ming Li, Siu-Ming Yiu, Jiao Du, Jun-Zhe Zhu, and Gang-Gang Jin. "Fair hierarchical secret sharing scheme based on smart contract." Information Sciences 546 (February 2021): 166–76. http://dx.doi.org/10.1016/j.ins.2020.07.032.
Full textSon, Ae-Seon, Soo-Bin Yoo, Jung-Hwa Jo, and Su-Min Yoo. "A Study on Smart Contract Platform using Secret Sharing Scheme." Journal of Korean Institute of Information Technology 18, no. 11 (2020): 131–38. http://dx.doi.org/10.14801/jkiit.2020.18.11.131.
Full textZiar, Riaz Ahmad, Syed Irfanullah, Wajid Ullah Khan, and Abdus Salam. "Privacy Preservation for On-Chain Data in the Permission less Blockchain using Symmetric Key Encryption and Smart Contract." April 2021 40, no. 2 (2021): 305–13. http://dx.doi.org/10.22581/muet1982.2102.05.
Full textLEE, Chang Joo. "A Study on the anti-competition contract for trade secret protection and freedom of occupation choice." European Constitutional Law Association 31 (December 31, 2019): 371–400. http://dx.doi.org/10.21592/eucj.2019.31.371.
Full textTong, Lee-Ann. "Protecting Traditional Knowledge – Does Secrecy Offer a Solution." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 13, no. 4 (2017): 158. http://dx.doi.org/10.17159/1727-3781/2010/v13i4a2705.
Full textAdams, Edward E. "Collusion and Price Fixing in the American Newspaper Industry: Market Preservation Trends, 1890–1910." Journalism & Mass Communication Quarterly 79, no. 2 (2002): 416–26. http://dx.doi.org/10.1177/107769900207900210.
Full textFeng, Tao, Xusheng Wang, Chunyan Liu, and Junli Fang. "Secure Data Collaborative Computing Scheme Based on Blockchain." Security and Communication Networks 2021 (January 13, 2021): 1–9. http://dx.doi.org/10.1155/2021/6630291.
Full textTriyana, Lily. "ASPEK YURIDIS PERJANJIAN BUSINESS FRANCHISE DI INDONESIA." Yuriska : Jurnal Ilmiah Hukum 10, no. 1 (2020): 1. http://dx.doi.org/10.24903/yrs.v10i1.256.
Full textTriana, Lily. "ASPEK YURIDIS PERJANJIAN BUSINESS FRANCHISE DI INDONESIA." Yuriska : Jurnal Ilmiah Hukum 10, no. 1 (2018): 1. http://dx.doi.org/10.24903/yrs.v10i1.263.
Full textTang, Fei, Hongda Li, Qihua Niu, and Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Full textTesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.
Full textTAO, WANG, YI XIAN YANG, and XIN XIN NIU. "NEW EFFICIENT TIMED COMMITMENT SCHEMES." International Journal of Information Technology & Decision Making 02, no. 02 (2003): 287–97. http://dx.doi.org/10.1142/s0219622003000616.
Full textPearce, Jone L., and Kenji Klein. "Distinguished Scholars Invited Essay: Are Secret Proceedings Why Longer Tenured Employees Trust Their Organizations Least?" Journal of Leadership & Organizational Studies 24, no. 4 (2017): 437–49. http://dx.doi.org/10.1177/1548051817721850.
Full textNaz, Muqaddas, Fahad A. Al-zahrani, Rabiya Khalid, et al. "A Secure Data Sharing Platform Using Blockchain and Interplanetary File System." Sustainability 11, no. 24 (2019): 7054. http://dx.doi.org/10.3390/su11247054.
Full textCatanzariti, Joseph, and Simon Brown. "Major Tribunal Decisions in 2007." Journal of Industrial Relations 50, no. 3 (2008): 429–46. http://dx.doi.org/10.1177/0022185608089998.
Full textBlock, Walter, N. Stephan Kinsella, and Hans-Hermann Hoppe. "The Second Paradox of Blackmail." Business Ethics Quarterly 10, no. 3 (2000): 593–622. http://dx.doi.org/10.2307/3857894.
Full textUlutas, Mustafa. "Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme." Mathematical Problems in Engineering 2010 (2010): 1–18. http://dx.doi.org/10.1155/2010/593236.
Full textBrown, Nahum. "The Logic of the Secret in Hegel and Derrida." Philosophy and Theology 31, no. 1 (2019): 39–58. http://dx.doi.org/10.5840/philtheol2020527125.
Full textShmatko, Olexander, Tetyana Borova, Serhii Yevseiev, and Oleksandr Milov. "Tokenization of educational assets based on blockchain technologies." ScienceRise: Pedagogical Education, no. 3(42) (May 31, 2021): 4–10. http://dx.doi.org/10.15587/2519-4984.2021.232321.
Full textΑναγνωστάκη, Λήδα, та Αθανασία Παπαθανασίου. "Μυστικά και εκμυστηρεύσεις: Πώς τα μικρά παιδιά χειρίζονται τα μυστικά". Psychology: the Journal of the Hellenic Psychological Society 18, № 2 (2020): 121. http://dx.doi.org/10.12681/psy_hps.23713.
Full textZhao, Hong, Xue Bai, Shihui Zheng, and Licheng Wang. "RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service." Entropy 22, no. 7 (2020): 712. http://dx.doi.org/10.3390/e22070712.
Full textLane, Philip A. "Reality in the 1990s and beyond—more with less." Journal of Automatic Chemistry 17, no. 3 (1995): 89–93. http://dx.doi.org/10.1155/s1463924695000150.
Full textDahlstedt, Ami Skånberg. "A Body of Accents." Nordic Journal of Dance 9, no. 1 (2018): 44–51. http://dx.doi.org/10.2478/njd-2018-0005.
Full textPedersen, Kim Arne. "Grundtvig om samfundspagt, gensidig frihed og menneskerettigheder i ca. 1840: Med en kommenteret tekstudgivelse." Grundtvig-Studier 55, no. 1 (2004): 14–33. http://dx.doi.org/10.7146/grs.v55i1.16452.
Full textShadhar, Alaa Kharbat, and Buroog Basheer Mahmood. "Risks of Design Stage in Iraqi Construction Project." Journal of Engineering 24, no. 3 (2018): 114. http://dx.doi.org/10.31026/j.eng.2018.03.09.
Full textDutta, Sabyasachi, Avishek Adhikari, and Sushmita Ruj. "Maximal contrast color visual secret sharing schemes." Designs, Codes and Cryptography 87, no. 7 (2018): 1699–711. http://dx.doi.org/10.1007/s10623-018-0570-6.
Full textYu, Bin, and Gang Shen. "Multi-secret visual cryptography with deterministic contrast." Multimedia Tools and Applications 72, no. 2 (2013): 1867–86. http://dx.doi.org/10.1007/s11042-013-1479-8.
Full textReddy T., Prashant. "The ‘Other IP Right’: Is It Time to Codify the Indian Law on Protection of Confidential Information?" Journal of National Law University Delhi 5, no. 1 (2018): 1–21. http://dx.doi.org/10.1177/2277401718787951.
Full textFumagalli, Chiara, and Massimo Motta. "Upstream mergers, downstream mergers, and secret vertical contracts." Research in Economics 55, no. 3 (2001): 275–89. http://dx.doi.org/10.1006/reec.2000.0255.
Full textZhao, Qinglan, Shuntong Yang, Dong Zheng, and Baodong Qin. "A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things." Security and Communication Networks 2019 (July 3, 2019): 1–8. http://dx.doi.org/10.1155/2019/8105787.
Full textWang, Rui, Guohua Wu, Qiuhua Wang, Lifeng Yuan, Zhen Zhang, and Gongxun Miao. "Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two’s Complement." Symmetry 13, no. 6 (2021): 921. http://dx.doi.org/10.3390/sym13060921.
Full textThapliyal, Kishore, Rishi Dutt Sharma, and Anirban Pathak. "Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment." International Journal of Quantum Information 16, no. 05 (2018): 1850047. http://dx.doi.org/10.1142/s0219749918500478.
Full textBiclet, Philippe. "Respect du contrat ou respect du secret, un dilemme." Médecine & Droit 1995, no. 10 (1995): 6–7. http://dx.doi.org/10.1016/1246-7391(95)80047-6.
Full textFu, Zheng Xin, and Bin Yu. "A Modified Multi-Secret Visual Cryptography with Ring Shares." Advanced Engineering Forum 6-7 (September 2012): 343–49. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.343.
Full textZhang, Wenyin, Frank Y. Shih, Shunbo Hu, and Muwei Jian. "A Visual Secret Sharing Scheme Based on Improved Local Binary Pattern." International Journal of Pattern Recognition and Artificial Intelligence 32, no. 06 (2018): 1850017. http://dx.doi.org/10.1142/s0218001418500179.
Full textGuo, Teng, Feng Liu, and ChuanKun Wu. "Threshold visual secret sharing by random grids with improved contrast." Journal of Systems and Software 86, no. 8 (2013): 2094–109. http://dx.doi.org/10.1016/j.jss.2013.03.062.
Full textGabrielsen, Tommy Staahl, and Bjørn Olav Johansen. "Resale Price Maintenance with Secret Contracts and Retail Service Externalities." American Economic Journal: Microeconomics 9, no. 1 (2017): 63–87. http://dx.doi.org/10.1257/mic.20140280.
Full textYang, Ching-Nung. "Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast." Optical Engineering 46, no. 9 (2007): 097005. http://dx.doi.org/10.1117/1.2786149.
Full textYan, Xuehu, Lei Sun, Yuliang Lu, and Guozheng Yang. "Adaptive Partial Image Secret Sharing." Symmetry 12, no. 5 (2020): 703. http://dx.doi.org/10.3390/sym12050703.
Full textSharma, Rahul, Nitesh Kumar Agrawal, Ayush Khare, and Arup Kumar Pal. "An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme." International Journal of Business Data Communications and Networking 12, no. 2 (2016): 80–88. http://dx.doi.org/10.4018/ijbdcn.2016070105.
Full textLin, Chih-Hung, Yao-Sheng Lee, and Tzung-Her Chen. "Friendly progressive random-grid-based visual secret sharing with adaptive contrast." Journal of Visual Communication and Image Representation 33 (November 2015): 31–41. http://dx.doi.org/10.1016/j.jvcir.2015.08.018.
Full textKRAUSE, MATTHIAS, and HANS ULRICH SIMON. "Determining the Optimal Contrast for Secret Sharing Schemes in Visual Cryptography." Combinatorics, Probability and Computing 12, no. 3 (2003): 285–99. http://dx.doi.org/10.1017/s096354830200559x.
Full textYang, Ching-Nung, Qin-Dong Sun, Yan-Xiao Liu, and Ci-Ming Wu. "A n-out-of-n Sharing Digital Image Scheme by Using Color Palette." Electronics 8, no. 7 (2019): 802. http://dx.doi.org/10.3390/electronics8070802.
Full textGuo, Yusheng, Xingxing Jia, Qimeng Chu, and Daoshun Wang. "A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion." Applied Sciences 10, no. 4 (2020): 1321. http://dx.doi.org/10.3390/app10041321.
Full textBrown, Carolyn, and Marcel van der Linden. "Shifting Boundaries between Free and Unfree Labor: Introduction." International Labor and Working-Class History 78, no. 1 (2010): 4–11. http://dx.doi.org/10.1017/s0147547910000086.
Full textBrody, Howard. "Gag Rules and Trade Secrets in Managed Care Contracts." Archives of Internal Medicine 157, no. 18 (1997): 2037. http://dx.doi.org/10.1001/archinte.1997.00440390019003.
Full textOsborne, M. "The Plot: The Secret Story of the Protocols of the Elders of Zion. Will Eisner. New York: Norton, 2005. vii + 148 pages. $19.95 cloth, $14.95 paper and The Contract with God Trilogy: Life on Dropsie Avenue. Will Eisner. New York: Norton, 2005. xx + 498 pages. $29.95 cloth." MELUS: Multi-Ethnic Literature of the United States 32, no. 3 (2007): 270–73. http://dx.doi.org/10.1093/melus/32.3.270.
Full textMäkeläinen, Emma-Lotta, Sofia Toivonen, and Tiina Räsänen. "Proper, Weighty and Extremely Weighty Cause to End an Employment Contract in Finland." Udayana Journal of Law and Culture 2, no. 1 (2018): 1. http://dx.doi.org/10.24843/ujlc.2018.v02.i01.p01.
Full textHofmeister, Thomas, Matthias Krause, and Hans U. Simon. "Contrast-optimal k out of n secret sharing schemes in visual cryptography." Theoretical Computer Science 240, no. 2 (2000): 471–85. http://dx.doi.org/10.1016/s0304-3975(99)00243-1.
Full textPARIKH, MAULIK. "A SECRET TUNNEL THROUGH THE HORIZON." International Journal of Modern Physics D 13, no. 10 (2004): 2351–54. http://dx.doi.org/10.1142/s0218271804006498.
Full text