Results 111 to 120 of about 27,441 (278)
Provably Secure Cryptographic Constructions
Modern cryptography has virtually no provably secure constructions. Starting from the first Diffie–Hellman key agreement protocol (Diffie & Hellman, 1976) and the first public key cryptosystemRSA (Rivest et al., 1978), not a single public key cryptographic protocol has been proven secure. Note, however, that there exist secure secret key protocols, e.g.
openaire +3 more sources
ABSTRACT Illegal gold mining has emerged as a major sustainability threat in the Amazon, eroding Indigenous rights, forest integrity, and climate mitigation efforts. This study examines how international market incentives relate to the expansion of illegal mining and associated deforestation within the Yanomami Indigenous Territory (YIT) from 2008 to ...
Shirléia Lago Santos +2 more
wiley +1 more source
ABSTRACT Achieving global sustainability requires rethinking marketing beyond firm centred strategies and towards systemic approaches that engage diverse stakeholders in value co‐creation. This paper proposes a conceptual framework for participatory value co‐creation in sustainable market systems, drawing on stakeholder theory, systems thinking ...
Ahmet Küçükuncular
wiley +1 more source
ABSTRACT This study explores the intricate connections between climate change, sustainability, consumer behavior, and food security through a comprehensive thematic analysis of expert opinions. Drawing from interviews with experts in green finance, environmental policy, and sustainability consulting, the research identifies key thematic areas ...
Ayten Nahide Korkmaz +4 more
wiley +1 more source
ABSTRACT The pursuit of Sustainable Development Goals (SDGs) 7, 9, 12, and 13, centered on affordable clean energy, industrial innovation, responsible production, and climate action, has gained momentum across Latin American economies. However, the region continues to face the dual challenge of achieving economic growth while mitigating rising carbon ...
Agyemang Kwasi Sampene +2 more
wiley +1 more source
Password-only authenticated three-party key exchange with provable security in the standard model. [PDF]
Nam J +6 more
europepmc +1 more source
ABSTRACT This study aims to analyze the disaggregated effects of solar photovoltaic (PV), solar thermal (ST), and solar photovoltaic‐thermal hybrid (PV/T) technologies on solar energy capacity in the G‐7 countries, which are among the leading users of solar energy technologies, over the period 2000–2020, by employing panel data estimators (CCEMG and ...
Oguzhan Bozatli +3 more
wiley +1 more source
ABSTRACT This paper examines how legal and institutional frameworks influence bank financing for sustainable innovation among SMEs in the European Union (EU) and African Union (AU). Using institutional theory, it analyzes how coercive, normative, and mimetic pressures interact across international, regional, and domestic levels to shape green lending ...
Priscilla Akua Vitoh
wiley +1 more source
Venture Capital Practices in Saudi Arabia: The Views of Investors
ABSTRACT This study examines how venture capital (VC) investors in Saudi Arabia evaluate, negotiate, and support entrepreneurial ventures in a rapidly developing yet institutionally young setting. Drawing on 21 semi‐structured interviews with 24 investors, it offers rare insight into VC practices in the Middle East.
Tibah al‐Harbi +2 more
wiley +1 more source
ABSTRACT Small and medium‐sized enterprises (SMEs) face significant institutional barriers when expanding across borders, including regulatory constraints, financial accessibility issues, and market entry challenges. Institutional theory provides a useful framework for understanding how external regulative, normative, and cognitive institutional forces
Sharmin Nahar, Muntasir Alam
wiley +1 more source

