X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (1685) 1685
Publication (176) 176
Conference Proceeding (123) 123
Newspaper Article (40) 40
Book Chapter (37) 37
Dissertation (28) 28
Book / eBook (20) 20
Magazine Article (12) 12
Book Review (7) 7
Trade Publication Article (7) 7
Government Document (4) 4
Paper (4) 4
Web Resource (4) 4
Reference (3) 3
Transcript (2) 2
Newsletter (1) 1
Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
agreements (348) 348
agreement (347) 347
studies (339) 339
analysis (298) 298
economics (292) 292
computer science (234) 234
algorithms (215) 215
security (200) 200
computer science, information systems (195) 195
computer science, theory & methods (192) 192
cryptography (177) 177
index medicus (177) 177
authentication (175) 175
telecommunications (172) 172
protocol (166) 166
engineering, electrical & electronic (163) 163
trade agreements (154) 154
humans (145) 145
key agreement (135) 135
international trade (131) 131
international agreements (111) 111
research (110) 110
computer communication networks (107) 107
economic models (107) 107
models (106) 106
economic theory (102) 102
mathematical models (93) 93
computer science, software engineering (91) 91
mathematics, applied (89) 89
methods (89) 89
protocols (89) 89
networks (88) 88
free trade (84) 84
engineering (83) 83
consensus (82) 82
computer simulation (81) 81
statistics & probability (81) 81
efficient (80) 80
usage (79) 79
international relations (78) 78
mathematics (77) 77
management (76) 76
byzantine agreement (75) 75
communication (75) 75
communications engineering, networks (75) 75
privacy (75) 75
computer security (74) 74
physics (71) 71
game theory (68) 68
political science (68) 68
trade (67) 67
reproducibility of results (66) 66
reliability (65) 65
computation (64) 64
economics / management science (64) 64
scheme (64) 64
model (63) 63
cryptanalysis (62) 62
computer science, hardware & architecture (61) 61
quantum physics (61) 61
secure (61) 61
bayes theorem (59) 59
data structures, cryptology and information theory (59) 59
female (58) 58
tariffs (58) 58
computer network protocols (57) 57
physics, multidisciplinary (57) 57
computer information security (56) 56
mathematical analysis (56) 56
mathematics, interdisciplinary applications (55) 55
smart cards (55) 55
male (54) 54
north american free trade agreement (54) 54
servers (54) 54
statistics (53) 53
data encryption (52) 52
information (52) 52
environmental studies (50) 50
wireless networks (50) 50
authentifizierung (49) 49
exchange (49) 49
article subject (48) 48
theory of computation (48) 48
trade policy (48) 48
biometrics (46) 46
environmental economics (46) 46
passwords (46) 46
policy (46) 46
economic policy (45) 45
optimization (45) 45
computer systems organization and communication networks (44) 44
computer networks (43) 43
multidisciplinary sciences (43) 43
simulation (43) 43
artificial intelligence (42) 42
contracts (42) 42
cooperation (42) 42
internet (42) 42
medical informatics (42) 42
theory (42) 42
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (7) 7
Collection Dvlpm't (Acquisitions) - Vendor file (3) 3
UTL at Downsview - May be requested (2) 2
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Gerstein Science - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
Law (Bora Laskin) - Theses (1) 1
New College (Ivey) - Stacks (1) 1
Online Resources - Online (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
Trinity College (John W Graham) - Stacks (1) 1
University College (Laidlaw) - Stacks (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1867) 1867
German (41) 41
Japanese (7) 7
Korean (5) 5
French (4) 4
Spanish (3) 3
Chinese (1) 1
Serbian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Physical Review Letters, ISSN 0031-9007, 2006, Volume 97, Issue 12, p. 120405
The first step in any quantum key distribution (QKD) protocol consists of sequences of measurements that produce correlated classical data. We show that these... 
AGREEMENT | PHYSICS, MULTIDISCIPLINARY | INFORMATION | CRYPTOGRAPHY | Physics - Quantum Physics
Journal Article
European Physical Journal A, ISSN 1434-6001, 05/2018, Volume 54, Issue 5
Journal Article
Journal Article
International Journal of the Commons, ISSN 1875-0281, 1/2016, Volume 10, Issue 1, pp. 244 - 264
The Coase theorem is most often formulated in terms of bilateral monopoly, for instance between a polluting factory and an affected neighbour. Instead, we... 
Research articles | Coase theorem | Non-cooperative games | Complementary property rights | Anticommons | Bundling agreements | Rational tragedies | rational tragedies | PROPERTY | bundling agreements | complementary property rights | HOLDOUTS | non-cooperative games | EXTERNALITIES | COST | TRAGEDY | COMMONS | ENVIRONMENTAL STUDIES | coase theorem | anticommons
Journal Article
International Journal of Communication Systems, ISSN 1074-5351, 01/2014, Volume 27, Issue 1, pp. 126 - 134
SUMMARYThe group key distribution protocol is a mechanism for distributing a group key that is used to encrypt the communication data transmitted in an open... 
generalized Chinese remainder theorem | session key | group key distribution | secret sharing | AGREEMENT | TELECOMMUNICATIONS | EFFICIENT | ENGINEERING, ELECTRICAL & ELECTRONIC | Broadcasting
Journal Article
Security and Communication Networks, ISSN 1939-0114, 07/2014, Volume 7, Issue 7, pp. 1079 - 1095
Journal Article
IEEE Transactions on Vehicular Technology, ISSN 0018-9545, 10/2013, Volume 62, Issue 8, pp. 4020 - 4027
Journal Article
by Zhu, HF
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, ISSN 1976-7277, 12/2017, Volume 11, Issue 12, pp. 6188 - 6204
Over the years, more password-based authentication key agreement schemes using chaotic maps were susceptible to attack by off-line password guess attack. This... 
Key agreement | mutual authentication | password-guessing attack | AUTHENTICATION | PROTOCOLS | MULTISERVER ENVIRONMENT | SECURITY | COMPUTER SCIENCE, INFORMATION SYSTEMS | chaotic maps | KEY AGREEMENT SCHEME | TELECOMMUNICATIONS | CRYPTOGRAPHY | Data security | Computer network protocols | Authentication | Methods | Access control (Computers) | 컴퓨터학
Journal Article
Journal of Philosophical Logic, ISSN 0022-3611, 8/2012, Volume 41, Issue 4, pp. 735 - 764
Journal Article
Theoretical Economics, ISSN 1933-6837, 05/2011, Volume 6, Issue 2, pp. 269 - 287
Aumann (1976) shows that agents who have a common prior cannot have common knowledge of their posteriors for event E if these posteriors do not coincide. But... 
common prior | Agreement theorem | C70 | common knowledge | no trade theorem | D82 | Common knowledge | No trade theorem | Common prior | DISAGREE | TRADE | AGGREGATE | ASYMMETRIC INFORMATION | CONSENSUS | BELIEFS | ECONOMICS | Agreeing theorem; common knowledge; common prior; no trade theorem
Journal Article
by Jiang, Y and Shen, Y and Zhu, QY
SENSORS, ISSN 1424-8220, 03/2020, Volume 20, Issue 5, p. 1357
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 02/2020, Volume 66, Issue 2, pp. 704 - 721
Journal Article
Economics Letters, ISSN 0165-1765, 11/2017, Volume 160, p. 43
The no-information case of a finite horizon joint search problem between two players with conflicting preferences is studied. It is shown that if the players... 
Studies | Treatment preferences | Theorems | Agreements
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 50, pp. 244 - 251
The Detection and Prevention system against many attacks has been formulated in Mobile ad hoc networks to secure the data and to provide the uninterrupted... 
Truth of convergence | detection system | Dual Trust Evaluation | bound of confidence | Aumann agreement theorem | Bound of confidence | Dual trust evaluation | Detection system
Journal Article
Optics Express, ISSN 1094-4087, 10/2018, Volume 26, Issue 22, pp. 29296 - 29310
Broadcast and multi-cast communications are two important applications in quantum information science. Such applications guarantee the implementation of... 
BELL THEOREM | REMOTE STATE PREPARATION | PHOTONS | CONTROLLED TELEPORTATION | OPTICS | PODOLSKY-ROSEN CHANNELS | KEY AGREEMENT | CRYPTOGRAPHY
Journal Article
Journal of Financial Management & Analysis, ISSN 0970-4205, 07/2012, Volume 25, Issue 2, p. 51
  This paper empirically tests the Kumara Swamy Theorem of the Inflationary Gap for the U.S.A, Canada and Mexico, the three countries that constitute the North... 
Reports | Theorems (Mathematics) | Consumer price indexes | Usage | Analysis | Studies | International comparisons | Money supply | Theorems | Inflation | North American Free Trade Agreement | Consumer Price Index
Journal Article
IEEE Transactions on Automatic Control, ISSN 0018-9286, 11/2013, Volume 58, Issue 11, pp. 2912 - 2917
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 11/2013, Volume 59, Issue 11, pp. 7071 - 7096
Journal Article
Psychological Methods, ISSN 1082-989X, 05/2018, Volume 24, Issue 4, pp. 439 - 451
We derive a general structure that encompasses important coefficients of interrater agreement such as the S-coefficient, Cohen's kappa, Scott's pi, Fleiss'... 
Nominal categories | Interrater agreement | Qualitative judgments | nominal categories | G-INDEX | PSYCHOLOGY, MULTIDISCIPLINARY | qualitative judgments | KAPPA | RELIABILITY | MODEL | interrater agreement | Reproducibility of Results | Statistics as Topic | Humans | Observer Variation | Bayes Theorem | Classification
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.