Results 61 to 70 of about 1,527 (301)

Provable security signcryption scheme based on RLWE without trapdoor

open access: yesTongxin xuebao, 2020
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU   +3 more
doaj   +2 more sources

Geochronology of the Whittlesey sedimentary succession, eastern England: The ‘Pompeii’ of the British late Middle Pleistocene to Holocene record

open access: yesJournal of Quaternary Science, EarlyView.
Abstract The sedimentary succession at Whittlesey preserves a unique British late Middle Pleistocene to Holocene record back to a time equivalent to at least marine oxygen isotope stage 8 (ca. 250 ka). This study builds on previously published sedimentology, geochronology and palaeoecology results to establish 20 sedimentary facies associations, with ...
H. E. Langford   +3 more
wiley   +1 more source

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud

open access: yesIEEE Access, 2019
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao   +3 more
doaj   +1 more source

Exploring production of social and economic value in social enterprises through a business model framework

open access: yesStrategic Change, EarlyView.
Abstract This study explores how social enterprises create social and economic value through business models that support ex‐offenders. The work was motivated by a request for help from an entrepreneur wishing to establish a business that supports ex‐offender rehabilitation.
Elizabeth Green   +2 more
wiley   +1 more source

A Secure and Efficient Handover Authentication Protocol for Wireless Networks

open access: yesSensors, 2014
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security
Weijia Wang, Lei Hu
doaj   +1 more source

Radical Uncertainty and New Sector Emergence: An Action Theory of Co‐Creative Stakeholders

open access: yesStrategic Change, EarlyView.
ABSTRACT For much of the past century, entrepreneurship scholars have sought to understand and assess the nature, role, and impact of uncertainty. While the sum total of this work has contributed valuable insights, radical uncertainty—characterized by dynamic conditions in which outcomes are unknowable at the time action must be taken—remains weakly ...
Parul Manocha   +1 more
wiley   +1 more source

Do Policy Capacities Matter for Federal Policy Design? Evidence From the Implementation of Three Social Policies in Brazil

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT Bringing together the literature on policy design, policy capacity and policy making in multilevel systems, this paper argues that the effectiveness of policy design in federal countries depends, ceteris paribus, on the adequacy of federal and local policy capacities.
Giliberto Capano   +1 more
wiley   +1 more source

Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud

open access: yesIEEE Access, 2018
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang   +4 more
doaj   +1 more source

Digitising biological collections to advance National Species Inventories: A case study from the flora of Chile

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
In response to Chile's public policy to establish a national biodiversity inventory and monitoring system, we launched the HerbarioDigital.cl portal. We have digitised over 120,000 specimens representing more than 3,900 species from two Chilean herbaria, integrating them through a curated local taxonomic index.
Ricardo A. Segovia   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy