Provably Secure Metering Scheme
identifier:oai:t2r2.star.titech.ac.jp ...
openaire
Broke Autocrats, Broken Elections: Trade Shocks and Electoral Fraud in Autocracies
ABSTRACT We argue that when terms‐of‐trade (ToT) shocks reduce resource rents, autocrats lose the fiscal capacity to sustain loyalty through patronage and increasingly rely on electoral manipulation as a survival strategy. We present a simple model in which rents finance patronage in normal times, while adverse shocks reduce the effectiveness of ...
Antonis Adam, Sofia Tsarsitalidou
wiley +1 more source
DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning. [PDF]
Li S, Zhang Y, Bai J, Fan K.
europepmc +1 more source
The commercialization of labour markets: Evidence from wage inequality in the Middle Ages
Abstract This paper moves beyond the focus on ‘average’ wage trends in pre‐industrial economies by examining the broad diversity of pay rates and forms of remuneration across occupations and regions in medieval England. We find that whilst some workers enjoyed substantial growth in wage rates after the Black Death, there was a large group who ...
Jordan Claridge +2 more
wiley +1 more source
A Decentralized Signcryption Scheme Based on CFL. [PDF]
Shi L, Liu M.
europepmc +1 more source
Can Central Bank Digital Currencies Promote the Internationalization of Currencies?
ABSTRACT Using multinational data (2000–2023), this study employed system GMM and fixed‐effects models to examine CBDC's impact on currency internationalization through a framework measuring ‘market acceptance’ and ‘policy drive.’ The results indicated that CBDC advancement significantly promotes currency internationalization.
Haodong Gu
wiley +1 more source
A collaborative multi-party encryption for mitigating man-in-the-middle attacks in smart grid and energy IoT systems. [PDF]
Alfawair M.
europepmc +1 more source
ABSTRACT In this essay, I will tell the reader about the relationship between Academia—the person, Academia—the institution, and too many female academics. Through these experiences, I will offer examples of some of the typical abuse experienced at the hands of Academia.
Steffi Siegert
wiley +1 more source
A multi-authority attribute ring signature supporting dynamic policies and dual anonymity for zero-trust networks. [PDF]
Chen J, Zhou X, Fu W, Mao Y, Wang J.
europepmc +1 more source
Opportunistic Recharge Enhancement in Arid and Semi‐Arid Regions
Groundwater supplies are increasingly stressed by climatic trends and multiple competing uses, especially in dryland environments. We propose opportunistic recharge enhancement (ORE) as a cross‐disciplinary, scalable framework to augment groundwater supplies by strategically integrating recharge co‐benefits into existing land and water management ...
Neha Gupta +13 more
wiley +1 more source

