Results 101 to 110 of about 27,441 (278)
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG +3 more
doaj
Artificial Intelligence Revolution: The Need for a Regulatory and Governance Framework in Dentistry
Journal of Dental Education, EarlyView.
Ehsan Jozaghi
wiley +1 more source
ABSTRACT Bringing together the literature on policy design, policy capacity and policy making in multilevel systems, this paper argues that the effectiveness of policy design in federal countries depends, ceteris paribus, on the adequacy of federal and local policy capacities.
Giliberto Capano +1 more
wiley +1 more source
In response to Chile's public policy to establish a national biodiversity inventory and monitoring system, we launched the HerbarioDigital.cl portal. We have digitised over 120,000 specimens representing more than 3,900 species from two Chilean herbaria, integrating them through a curated local taxonomic index.
Ricardo A. Segovia +5 more
wiley +1 more source
Leading Sustainable Competitive Advantage From Within: An Analysis of the Mining Industry
ABSTRACT Sustainability has emerged as a critical global challenge, compelling industries to integrate environmental considerations into their core strategies. The main objective of this study is to examine the direct influence of green transformational leadership and the mediating roles of green knowledge management and green motivation in achieving a
Zhadyra Konurbayeva +5 more
wiley +1 more source
Edwards curves based security authentication protocol for mobile RFID systems
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG +3 more
doaj +2 more sources
Linearly homomorphic aggregate signature secure in the standard model
Existing lattice-based linear homomorphic signature schemes have difficulty in balancing multi-user aggregation and provable security under the standard model, which limits their practical application in real-world distributed scenarios.
HAN Yiliang +4 more
doaj
Towards provably secure efficiently searchable encryption [PDF]
Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.
openaire +2 more sources
ABSTRACT This study investigates stakeholder perspectives on mobilising private‐sector finance for climate adaptation in Southeast Asia, emphasising Hong Kong's role as a financial intermediary. Through semi‐structured interviews with diverse stakeholders, including practitioners, policymakers, insurers, and project developers, we employed a grounded ...
Laurence L. Delina +4 more
wiley +1 more source
A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar +3 more
core

