Results 51 to 60 of about 27,441 (278)
Public and Private Enforcement of the Securities Laws: Have Things Changed Since Enron? [PDF]
In this paper, we examine how those corporations that have been the targets of SEC enforcement efforts compare in terms of their size and financial health vis-a-vis firms that are targeted only by the private securities class action.
Cox, James D., Thomas, Randall S.
core +2 more sources
Abstract Curriculum decolonisation has become a prominent feature of equity agendas in UK higher education, yet there remains limited empirical and theoretical work on how such initiatives are evaluated, particularly within business schools. This paper presents one of the first multi‐institutional empirical studies examining how UK business schools ...
Sally Everett +2 more
wiley +1 more source
Security model for ID-based key exchange
The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed.
LIU Wen-ju1 +4 more
doaj +2 more sources
General MIM Secure Two-round Authentication Protocol Based on LPN [PDF]
The LPN-based authentication protocol is simple in structure,low in computation,and resistant to quantum attacks.It is suitable for lightweight devices such as radio frequency identification,but it cannot meet the requirements of low cost and strong ...
QING Zhejia
doaj +1 more source
Cloud Data Auditing Using Proofs of Retrievability
Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious.
Ruj, Sushmita, Sengupta, Binanda
core +1 more source
ABSTRACT Although artificial intelligence (AI) is increasingly being touted to assist organizations, AI integration for sustainability efforts has been limited AND sporadic and tends to follow an ad hoc strategy. The existing literature therein focuses on the technological capabilities of AI, overlooking how organizations make sense of and ...
Amanda Balasooriya, Darshana Sedera
wiley +1 more source
The Fast, the Steady and the Tenacious: Funding Pathways for Circular Start‐Ups
ABSTRACT Circular start‐ups (CSUs) are critical for unlocking the circular economy, yet they face persistent barriers in accessing finance. Despite growing interest from policymakers and financing institutions, little empirical evidence explains how these ventures pursue and secure funding.
Pilar Mejía‐Vélez +4 more
wiley +1 more source
Provable image encryption scheme via trapdoor permutation
Nowadays, due to the advancement in networks, it has become easy to share multimedia information such as images, voice, and videos in real‐time. In the process of multimedia storage and transmission, it is crucial to ensure the security and privacy of ...
Dongmei Li, Haikuan Liu
doaj +1 more source
NSEC5, DNSSEC authenticated denial of existence [PDF]
The Domain Name System Security Extensions (DNSSEC) introduced two resource records (RR) for authenticated denial of existence: the NSEC RR and the NSEC3 RR. This document introduces NSEC5 as an alternative mechanism for DNSSEC authenticated
Goldberg, Sharon +4 more
core
Formalising Sustainability Management as a Core Process Group in Project Management
ABSTRACT Sustainability has become a strategic imperative for organisations, yet widely used project management standards such as the PMBoK sixth and seventh editions still do not formalise how sustainability should be embedded across project work. This gap matters because PMBoK‐based processes shape governance, roles, documentation and performance ...
Cinzia Dessi +3 more
wiley +1 more source

