Results 91 to 100 of about 44,601 (278)

Improved direct anonymous attestation scheme for mobile computing platforms

open access: yesTongxin xuebao, 2013
The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote ...
Li YANG   +3 more
doaj   +2 more sources

The Semi‐Structured Clinical Interview for the Assessment of Compulsive Sexual Behavior (SSCI‐CSB): Development, Reliability, and Validity

open access: yesJournal of Clinical Psychology, EarlyView.
ABSTRACT Objectives The assessment of Compulsive Sexual Behavior (CSB) requires fine‐grained assessment approaches, ideally through clinical interviews. However, none of the few available clinical interviews for CSB have demonstrated strong psychometric properties.
J. Castro‐Calvo   +5 more
wiley   +1 more source

Software-defined Perimeter Anonymous Authentication Scheme Based on Verifiable Credentials [PDF]

open access: yesJisuanji kexue
The standard SDP architecture employs identity-based authentication and authorization strategies to monitor and audit access activities in real time.However,users must fully disclose their identity information to obtain access,potentially exposing ...
SI Xuege, JIA Hongyong, LI Weixian, ZENG Junjie , MEN Ruirui
doaj   +1 more source

Policy Capacity Matters Differently Over Time: The Emergence and Persistence of Participatory Budgeting in China

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT The persistence of participatory budgeting (PB) in selected Chinese localities challenges the conventional wisdom that deliberative democratic practices can only take root in liberal political environments. Yet, existing literature has not sufficiently elucidated the factors underpinning the rise and sustained operation of PB in this seemingly
Yifei Yan   +3 more
wiley   +1 more source

Decentralized k-Times Anonymous Attribute Authentication Supporting Blacklist [PDF]

open access: yesJisuanji gongcheng
As cloud computing and data services become increasingly prevalent, the demand for privacy protection and data security has increased. Traditional anonymous authentication schemes can safeguard user privacy but often lack effective user access control ...
TAO Jingyi, PENG Lingqi, KAN Haibin
doaj   +1 more source

Rethinking Public Administration Reform: Institutional Layering of Bureaucratic, Managerial and Community Logics Over Time in Nigeria's Tax Administration

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT The reform of public institutions has attracted sustained attention in both scholarship and policymaking. Increasingly, however, there is growing recognition that reforms are rarely implemented in an institutional vacuum. Instead, new reforms are layered onto existing arrangements, producing hybrid institutional landscapes shaped by prior ...
Edidiong Bassey
wiley   +1 more source

Research on batch anonymous authentication scheme for VANET based on bilinear pairing

open access: yesTongxin xuebao, 2017
To solve the problem of efficiency of anonymous authentication in vehicular ad hoc network,a batch anonymous authentication scheme was proposed by using bilinear pairing on elliptic curves .The signature was generated by the roadside unit node (RSU) and ...
Cheng SONG   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy