Showing 1 - 20 results of 2,071 for search '"The Sender"', query time: 0.15s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Provably sender-deniable encryption scheme by N.A. Moldovyan, A.A. Moldovyan, V.A. Shcherbacov

    Published 2015-05-01
    “…The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the roots of which are two simultaneously encrypted texts. …”
    Get full text
    Article
  5. 5

    Sender paid and authenticated messaging (SPAM) by Evan Yonathan Aryohutomo Murdiwanto.

    Published 2009
    “…Sender Paid and Authenticated Messaging (SPAM) is a complete framework of e-mail, sms, and chat messaging that incorporates new approach in fighting bulky unwanted message, also known as spam. …”
    Get full text
    Final Year Project (FYP)
  6. 6

    Sender-reader relations in live online commentary by Rafał Siekiera

    Published 2018-05-01
    “…One of the differences is the sender-reader relation. The aim of the article is to characterise this relation. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Sender Gender Influences Emoji Interpretation in Text Messages by Sarah E. Butterworth, Traci A. Giuliano, Justin White, Lizette Cantu, Kyle C. Fraser

    Published 2019-04-01
    “…In general, we predicted that text messages containing affectionate emojis (i.e., kissing-face and heart emoji) would be perceived as more appropriate and likable when they came from female than from male senders, whereas messages containing less overtly affectionate (but still friendly) emojis (i.e., smiling-face emoji) would be considered equally appropriate and likable whether it came from female or male senders. …”
    Get full text
    Article
  11. 11

    Raven food calls indicate sender’s age and sex by Markus Boeckle, Georgine Szipl, Thomas Bugnyar

    Published 2018-03-01
    “…Abstract Background Acoustic parameters of animal signals have been shown to correlate with various phenotypic characteristics of the sender. These acoustic characteristics can be learned and categorized and thus are a basis for perceivers’ recognition abilities. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Single Cell Analysis of a Bacterial Sender-Receiver System. by Tiago Ramalho, Andrea Meyer, Andrea Mückl, Korbinian Kapsner, Ulrich Gerland, Friedrich C Simmel

    Published 2016-01-01
    “…For the analysis of systems containing both AHL senders and receiver cells, we utilize the receiver cells as 'bacterial sensors' for AHL. …”
    Get full text
    Article
  16. 16
  17. 17

    Achieving Sender Anonymity in Tor against the Global Passive Adversary by Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, Cecilia Labrini, Sara Lazzaro

    Published 2021-12-01
    “…Despite its wide usage, Tor does not guarantee sender anonymity, even in a threat model in which the attacker passively observes the traffic at the first Tor router. …”
    Get full text
    Article
  18. 18

    Quantum and superquantum enhancements to two-sender, two-receiver channels by Quek, Yihui, Shor, Peter Williston

    Published 2017
    “…This feat is not achievable with the best classical (senders share no resources) or quantum-entanglement-assisted (senders share entanglement) strategies. …”
    Get full text
    Get full text
    Article
  19. 19

    Practical Sender Authentication Scheme for In-Vehicle CAN With Efficient Key Management by Taek-Young Youn, Yousik Lee, Samuel Woo

    Published 2020-01-01
    “…In this paper, we propose a sender authentication and key management schemes considering the limitations of In-vehicle CAN. …”
    Get full text
    Article
  20. 20

    To Whom Should I Send it? Sender Perspective on Incentivized Word of Mouth by Christiana Yosevina Tercia, Thorsten Teichert

    Published 2020-08-01
    “…The different amount of incentive for senders and their receivers also leads senders to target receivers who are deal prone.…”
    Get full text
    Article