Results 91 to 100 of about 319,858 (317)

Water pricing and markets: Principles, practices and proposals

open access: yesApplied Economic Perspectives and Policy, EarlyView.
Abstract The allocation of water across space and time is a key challenge of water governance, with demand and supply often not well matched over time and place. Best practice water pricing and markets may promote water conservation, yet their application is limited.
Sarah Ann Wheeler   +2 more
wiley   +1 more source

Breaking the Hidden Irreducible Polynomials Scheme [PDF]

open access: yesarXiv, 2019
In 2019 G\'omez described a new public key cryptography scheme based on ideas from multivariate public key cryptography using hidden irreducible polynomials. We show that the scheme's design has a flaw which lets an attacker recover the private key directly from the public key.
arxiv  

Key derivation function: key-hash based computational extractor and stream based pseudorandom expander [PDF]

open access: yesPeerJ Computer Science
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys.
Chai Wen Chuah   +2 more
doaj   +2 more sources

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj   +3 more sources

Private Domain Adaptation from a Public Source [PDF]

open access: yesarXiv, 2022
A key problem in a variety of applications is that of domain adaptation from a public source domain, for which a relatively large amount of labeled data with no privacy constraints is at one's disposal, to a private target domain, for which a private sample is available with very few or no labeled data.
arxiv  

Mexican consumers' attitudes toward irradiated and imported apples

open access: yesAgribusiness, EarlyView.
Abstract This study centers on analyzing Mexican consumers' willingness to pay (WTP) for imported US fresh apples subjected to irradiation, contrasting it with the more prevalent postharvest chemical treatments. We collect data using a survey tool in Qualtrics designed to explore the impact of information dissemination through two distinct narrative ...
André D. Murray   +2 more
wiley   +1 more source

Security Algorithms for Cloud Computing Environment [PDF]

open access: yesarXiv, 2015
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key.
arxiv  

Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security [PDF]

open access: yes, 2018
We propose a Fourier domain asymmetric cryptosystem for multimodal biometric security. One modality of biometrics (such as face) is used as the plaintext, which is encrypted by another modality of biometrics (such as fingerprint). A private key is synthesized from the encrypted biometric signature by complex spatial Fourier processing.
arxiv   +1 more source

Product differentiation in the fruit industry: Lessons from trademarked apples

open access: yesAgribusiness, EarlyView.
Abstract We derive price premiums for patented or trademarked apple varieties, also known as “club apples,” compared to open‐variety apples. We use an expansive retail scanner dataset, along with unique data on apple taste characteristics, to estimate monthly club apple premiums for 2008–2018.
Modhurima Dey Amin   +3 more
wiley   +1 more source

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

open access: yesSensors, 2020
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encryption ...
Chiranji Lal Chowdhary   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy