Results 71 to 80 of about 44,601 (278)
ABSTRACT The global manufacturing sector has increasingly adopted circular economy (CE) practices to address sustainability challenges and improve operational efficiency. This study explores the impact of five CE practices—reduce, reuse, remanufacture, recycle, and recover—on key operational performance dimensions: quality, speed, dependability ...
Jose Arturo Garza‐Reyes +5 more
wiley +1 more source
ABSTRACT This study examines the influence of circular economy practices, as a manifestation of corporate social responsibility, on green value co‐creation and its subsequent effects on green collaborative practices and sustainable supply chain integration between providers and customers.
Adriana Santos +2 more
wiley +1 more source
Blockchain-based Internet of Things Traceable and Anonymous Cross-domain AuthenticationScheme [PDF]
With the wide application of Internet of things technology,there is an increasing demand for cross-domain information sharing,and cross-domain authentication scheme is the foundation for ensuring cross-domain secure collaboration.Realizing cross-domain ...
WANG Qiuli, REN Zhiyu, WU Xiangyu, GUAN Qiuguo, WANG Haichao
doaj +1 more source
ABSTRACT The growing complexity and severity of cross‐border climate risks characterised by non‐linear impact chains and deep uncertainty questions the capacity of environmental governance to tackle these problems effectively and in a just manner. To increase the efficiency of climate action, the private sector has been called upon to leverage market ...
Päivi Tikkakoski, Sirkku Juhola
wiley +1 more source
Building the Plane While Flying It: How Projects Serve to Implement, Pilot and Co‐Create EU Policy
ABSTRACT This article theorizes how projectified governance enables bottom‐up policy shaping in the EU, using the European Universities Initiative (EUI) as a case study. It develops a framework that combines bottom‐up Europeanization with resource exchange theory to explain how project networks influence EU policymaking.
Alina Felder‐Stindt
wiley +1 more source
Research on pairing-free certificateless batch anonymous authentication scheme for VANET
To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by
Cheng SONG +5 more
doaj +2 more sources
Anonymous Authentication on Trust in Pervasive Social Networking Based on Group Signature
Pervasive social networking (PSN) supports instant social activities anywhere and at any time with the support of heterogeneous networks, where privacy preservation is a crucial issue.
Wei Feng, Zheng Yan, Haomeng Xie
doaj +1 more source
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.).
A Blanco +15 more
core +3 more sources
We examined the functional relationship between large‐scale δ‐band phase synchrony and local epileptogenic β–γ‐band amplitude bistability during NREM sleep. Increased synchrony and strong bistability characterized the epileptogenic zone, with strongest effects during N2 sleep, when seizures most frequently occur.
Gaia Burlando +14 more
wiley +1 more source
A two‐step authentication framework for Mobile ad hoc networks [PDF]
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to ...
Douligeris, C. +2 more
core

