Results 41 to 50 of about 1,527 (301)
General MIM Secure Two-round Authentication Protocol Based on LPN [PDF]
The LPN-based authentication protocol is simple in structure,low in computation,and resistant to quantum attacks.It is suitable for lightweight devices such as radio frequency identification,but it cannot meet the requirements of low cost and strong ...
QING Zhejia
doaj +1 more source
Security of COFB against Chosen Ciphertext Attacks
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj +1 more source
The impacts of biological invasions
ABSTRACT The Anthropocene is characterised by a continuous human‐mediated reshuffling of the distributions of species globally. Both intentional and unintentional introductions have resulted in numerous species being translocated beyond their native ranges, often leading to their establishment and subsequent spread – a process referred to as biological
Phillip J. Haubrock +42 more
wiley +1 more source
Circular Economy Platforms: A Systematic Review
ABSTRACT Digital platforms enable circular business models that can provide both economic and environmental benefits. However, the literature on platforms in the context of the circular economy has remained descriptive and fragmented across fields, posing challenges for synthesizing accumulated knowledge.
Outi Blackburn +3 more
wiley +1 more source
Provable image encryption scheme via trapdoor permutation
Nowadays, due to the advancement in networks, it has become easy to share multimedia information such as images, voice, and videos in real‐time. In the process of multimedia storage and transmission, it is crucial to ensure the security and privacy of ...
Dongmei Li, Haikuan Liu
doaj +1 more source
The Mediating Role of Climate Targets in Corporate Emission Reductions
ABSTRACT Corporations worldwide increasingly commit to Sustainable Development Goal 13 (SDG 13), yet the extent to which such commitments translate into measurable greenhouse gas (GHG) reductions remains uncertain. Drawing on Institutional and Legitimacy Theory, this paper examines the mediating role of climate targets in the relationship between SDG ...
Evgenia Anagnostopoulou
wiley +1 more source
ABSTRACT This study examines how European automotive companies disclose circular economy (CE) information in light of the Corporate Sustainability Reporting Directive (CSRD) and the European Sustainability Reporting Standards (ESRS) E5. Using a mixed‐methods, data‐driven approach that combines keyword analysis and latent Dirichlet allocation (LDA ...
Dominika Hadro +4 more
wiley +1 more source
ABSTRACT Although artificial intelligence (AI) is increasingly being touted to assist organizations, AI integration for sustainability efforts has been limited AND sporadic and tends to follow an ad hoc strategy. The existing literature therein focuses on the technological capabilities of AI, overlooking how organizations make sense of and ...
Amanda Balasooriya, Darshana Sedera
wiley +1 more source
Provably Secure Metering Scheme [PDF]
Naor and Pinkas introduced metering schemes at Eurocrypt '98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number, say k, of clients.
Wakaha Ogata, Kaoru Kurosawa
openaire +1 more source
ABSTRACT Using the environmental quality cost management model, this study examines how fraud risk management (FRM) influences corporate sustainability performance (CSP) and how ownership structures moderate it. The study uses artificial neural networks (ANN) and logistic regression models to test two hypotheses. H1 demonstrates that the prevention and
Israel Akinbode Owolabi +3 more
wiley +1 more source

