Results 81 to 90 of about 7,587 (272)
Provable data possession scheme based on public verification and private verification
More and more users choose to transfer their applications and data into the cloud.Data security is a key issue for cloud storage systems.To ensure the integrity and validity of the data stored in the cloud,provable data possession (PDP) scheme is ...
Junfeng TIAN, Mengjia CHAI, Liuling QI
doaj +2 more sources
Lightweight Proofs of Retrievability for Electronic Evidence in Cloud
Proofs of Retrievability (PoR) is one of the basic functions of electronic evidence preservation center in cloud. This paper proposes two PoR schemes to execute the workflow of evidence preservation center, which are named Finer Grained Proofs of ...
Hongyao Deng, Xiuli Song
doaj +1 more source
Epistemic virtues, metavirtues, and computational complexity [PDF]
I argue that considerations about computational complexity show that all finite agents need characteristics like those that have been called epistemic virtues.
Morton, Professor Adam
core
ABSTRACT Despite the growing emphasis on sustainable finance in today's corporate landscape, its impact on product responsibility remains underexplored, particularly the moderating role of board environmental expertise. This study addresses these gaps by examining non‐financial companies listed on the London Stock Exchange, chosen for the UK's ...
Bright Akwasi Gyamfi +4 more
wiley +1 more source
Doctrinal Issues in Evidence and Proof [PDF]
The word evidence ordinarily means the statements, events, items, or sensory perceptions that suggest the existence or nonexistence of, or truth or falsity of, another fact.
Rothstein, Paul F
core +1 more source
Sustainability Disclosure and External Assurance of Reports in the Italian Agrifood Sector
ABSTRACT The European Union introduced the Corporate Sustainability Reporting Directive (CSRD) with the aim of aligning the “walk”—the implementation of substantive sustainability practices—and the “talk”—their representation in sustainability reporting.
Andrea Caccialanza +2 more
wiley +1 more source
Secure Cloud Storage Service Using Bloom Filters for the Internet of Things
Today, the Internet of Things (IoT) is used for convenience in everyday life in many areas. Owing to the fact that the data collected from the IoT are generated in large quantities, cloud computing is inevitably used to store and analyze the data ...
Junho Jeong +3 more
doaj +1 more source
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditor [PDF]
Using cloud services, anyone can remotely store their data and can have the on-demand high quality applications and services from a shared pool of computing resources, without the burden of local data storage and maintenance.
Deshmukh, R. R. (R) +2 more
core
Polar Codes over Fading Channels with Power and Delay Constraints
The inherent nature of polar codes being channel specific makes it difficult to use them in a setting where the communication channel changes with time.
Deekshith, P. K., Sahasranand, K. R.
core +1 more source
ABSTRACT China's environmental governance transition combines intensified vertical accountability and performance‐based management with expanding calls for public participation. However, despite growing demand for civic engagement, there remains limited understanding of how participatory environmental initiatives are structured and governed in practice.
Linjun Xie, Mengqi Shao, Gaohan Deng
wiley +1 more source

