Results 101 to 110 of about 27,441 (278)

Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud

open access: yesTongxin xuebao, 2021
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG   +3 more
doaj  

Do Policy Capacities Matter for Federal Policy Design? Evidence From the Implementation of Three Social Policies in Brazil

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT Bringing together the literature on policy design, policy capacity and policy making in multilevel systems, this paper argues that the effectiveness of policy design in federal countries depends, ceteris paribus, on the adequacy of federal and local policy capacities.
Giliberto Capano   +1 more
wiley   +1 more source

Digitising biological collections to advance National Species Inventories: A case study from the flora of Chile

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
In response to Chile's public policy to establish a national biodiversity inventory and monitoring system, we launched the HerbarioDigital.cl portal. We have digitised over 120,000 specimens representing more than 3,900 species from two Chilean herbaria, integrating them through a curated local taxonomic index.
Ricardo A. Segovia   +5 more
wiley   +1 more source

Leading Sustainable Competitive Advantage From Within: An Analysis of the Mining Industry

open access: yesSustainable Development, EarlyView.
ABSTRACT Sustainability has emerged as a critical global challenge, compelling industries to integrate environmental considerations into their core strategies. The main objective of this study is to examine the direct influence of green transformational leadership and the mediating roles of green knowledge management and green motivation in achieving a
Zhadyra Konurbayeva   +5 more
wiley   +1 more source

Edwards curves based security authentication protocol for mobile RFID systems

open access: yesTongxin xuebao, 2014
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG   +3 more
doaj   +2 more sources

Linearly homomorphic aggregate signature secure in the standard model

open access: yesTongxin xuebao
Existing lattice-based linear homomorphic signature schemes have difficulty in balancing multi-user aggregation and provable security under the standard model, which limits their practical application in real-world distributed scenarios.
HAN Yiliang   +4 more
doaj  

Towards provably secure efficiently searchable encryption [PDF]

open access: yes, 2012
Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.
openaire   +2 more sources

Overcoming Barriers and Solutions for Catalysing Private Capital in Climate Adaptation: A Stakeholder‐Informed Agenda for Hong Kong's Intermediary Role in Southeast Asia

open access: yesSustainable Development, EarlyView.
ABSTRACT This study investigates stakeholder perspectives on mobilising private‐sector finance for climate adaptation in Southeast Asia, emphasising Hong Kong's role as a financial intermediary. Through semi‐structured interviews with diverse stakeholders, including practitioners, policymakers, insurers, and project developers, we employed a grounded ...
Laurence L. Delina   +4 more
wiley   +1 more source

A Mediated Definite Delegation Model allowing for Certified Grid Job Submission

open access: yes, 2011
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation.
Betev, Latchezar   +3 more
core  

Home - About - Disclaimer - Privacy