Results 141 to 150 of about 695,630 (383)

k-Anonymity: A Model for Protecting Privacy

open access: yesInt. J. Uncertain. Fuzziness Knowl. Based Syst., 2002
L. Sweeney
semanticscholar   +1 more source

Farmers' Financial Literacy—Scale Development and Linkages to Accounting Practices and Financial Outcomes

open access: yesAgribusiness, EarlyView.
ABSTRACT This study investigates the financial literacy (FL) of Swedish farmers, its linkages to farmer characteristics, management accounting practices and farm outcomes by surveying Swedish Farm Accountancy Data Network farmers. Using item response theory, we expand the existing FL measurement specifically to the farming context, assess measurement ...
Uliana Gottlieb, Helena Hansson
wiley   +1 more source

Anonymity in Large Societies [PDF]

open access: yes
In a social choice model with an infinite number of agents, there may occur "equal size" coalitions that a preference aggregation rule should treat in the same manner.
Andrei Gomberg   +2 more
core  

L-diversity: privacy beyond k-anonymity

open access: yesIEEE International Conference on Data Engineering, 2006
Ashwin Machanavajjhala   +3 more
semanticscholar   +1 more source

Farmers' Participation in Messenger‐Based Social Groups And Its Effects on Performance in Irrigated Areas of Kazakhstan and Uzbekistan

open access: yesAgribusiness, EarlyView.
ABSTRACT The penetration of information and communication technologies (ICTs) in farming communities is increasing the use of smartphone‐based instant messaging apps. Despite this, the reasons behind participation and the impact on farm productivity in developing countries remain unexplored.
Zafar Kurbanov   +4 more
wiley   +1 more source

Fare non-repudiation protocol based on identity-based cryptography

open access: yesTongxin xuebao, 2009
A signature scheme with the one-off blind public key was proposed based on identity-based cryptography,and thus was applied in a new fare non-repudiation protocol.In this protocol,the sender was anonymity,so avoid that the recipient deliberately rejected
LIU Hong-wei   +3 more
doaj  

Anonymity in Nonatomic Games [PDF]

open access: yes
In nonatomic games, anonymity must be assumed in order to prove the existence of a Nash equilibrium in pure strategies. This can be formalized by making payoffs dependent either on the players' distribution on the action set or on the strategy mean.
Lorenzo Rocco
core  

t-Closeness: Privacy Beyond k-Anonymity and l-Diversity

open access: yesIEEE International Conference on Data Engineering, 2007
Ninghui Li   +2 more
semanticscholar   +1 more source

A Skills Gap Analysis of Farmer Directors of US Farmer Cooperatives

open access: yesAgribusiness, EarlyView.
ABSTRACT Boards of directors are vital to firm performance and are an integral part of the decision‐making process of any business. Several studies have been conducted that observe corporate or nonprofit board characteristics, skills, and the board's connection to firm performance.
Jody S. Herchenbach   +5 more
wiley   +1 more source

Research of platform identity attestation based on trusted chip

open access: yesTongxin xuebao, 2014
By studying the platform identity attestation base on trusted third parties, a scheme where a trusted computing platform is identified by a certificate and a token is proposed. In this scheme, only the token is used when the platform proves its identity.
Qian-ying ZHANG   +2 more
doaj  

Home - About - Disclaimer - Privacy