Results 151 to 160 of about 1,527 (301)
Provable Security of the Knudsen-Preneel Compression Functions [PDF]
Jooyoung Lee
openalex +1 more source
Abstract Our study challenges a commonly held assumption in the legitimacy and organizational change literatures: that the legitimacy of a change project is closely tied to, and dependent upon, the legitimacy of the change agent promoting it. Drawing on an in‐depth, three‐and‐a‐half‐year qualitative study of a major transformation within a French ...
Alaric Bourgoin +2 more
wiley +1 more source
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT [PDF]
Kisung Park +2 more
openalex +1 more source
ABSTRACT This study examines how Taiwanese members of parliament (MPs) deploy self‐referring expressions—specifically, the formal first‐person singular běnxí—to negotiate their institutional standing and project political power. By operationalizing access to objective power using the margin of victory (MoV) as one possible proxy, the research shows ...
Tsung‐Lun Alan Wan
wiley +1 more source
Segment and Recover: Defending Object Detectors Against Adversarial Patch Attacks. [PDF]
Gu H, Jafarnejadsani H.
europepmc +1 more source
Enhanced Rényi Entropy-Based Post-Quantum Key Agreement with Provable Security and Information-Theoretic Guarantees [PDF]
Ronghua Xu, Chenglian Liu
openalex +1 more source
The Provable Security of Ed25519: Theory and Practice
Jacqueline Brendel +3 more
openalex +2 more sources
Abstract Understanding the role of information communication technologies (ICTs) in development, especially in relation to marginalized populations, has been the focus of many related disciplinary categories within the broader ecosystem of information sciences.
Chidi Oguamanam
wiley +1 more source
A Decentralized Signcryption Scheme Based on CFL. [PDF]
Shi L, Liu M.
europepmc +1 more source

