Results 61 to 70 of about 956 (257)
arXiv admin note: text overlap with arXiv:1310.8038, arXiv:1310 ...
Li, Angsheng, Pan, Yicheng, Zhang, Wei
openaire +2 more sources
Abstract This study explores how social enterprises create social and economic value through business models that support ex‐offenders. The work was motivated by a request for help from an entrepreneur wishing to establish a business that supports ex‐offender rehabilitation.
Elizabeth Green +2 more
wiley +1 more source
Radical Uncertainty and New Sector Emergence: An Action Theory of Co‐Creative Stakeholders
ABSTRACT For much of the past century, entrepreneurship scholars have sought to understand and assess the nature, role, and impact of uncertainty. While the sum total of this work has contributed valuable insights, radical uncertainty—characterized by dynamic conditions in which outcomes are unknowable at the time action must be taken—remains weakly ...
Parul Manocha +1 more
wiley +1 more source
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
Should Dermatologists Recommend Direct‐to‐Consumer App‐Based Remote Diagnostics? An Ethical Analysis
ABSTRACT Background Dermatology patients still face barriers in accessing timely specialist care. As direct‐to‐consumer (DTC) apps for remote dermatological diagnostics proliferate, guidance is lacking. While promising efficiency and efficacy, their clinical—and ethical—legitimacy is not yet well established.
Sonja Mathes +9 more
wiley +1 more source
Improvement on the XTP public key cryptosystem and communication protocol of provable security
A new trace function was proposed,the XTP public key cryptosystem based on the 3-rd order LFSR se-quence(the so-called XTR3 system) was extended to the XTR4 system based on the 4-th order LFSR sequence.XTR4 key was shorter in length than that of the XTR3
WANG Ze-hui
doaj +2 more sources
Advances of Provable Security Techniques [PDF]
Yong Yu, Yi Mu
doaj +3 more sources
Identity-based Key-insulated Provable Multi-copy Data Possession in Multi-cloud Storage [PDF]
Provable data possession(PDP) allows users to verify that their outsourced data is intact without downloading all the data.To improve the availability and security of outsourced data,many users store multiple copies of their data on a single server.In ...
ZHOU Jie, WANG Huaqun
doaj +1 more source
Multi‐Agent Reinforcement Learning for Joint Police Patrol and Dispatch
ABSTRACT Police patrol units need to split their time between performing preventive patrol and being dispatched to serve emergency incidents. In the existing literature, patrol and dispatch decisions are often studied separately. We consider joint optimization of these two decisions to improve police operations efficiency and reduce response time to ...
Matthew Repasky, He Wang, Yao Xie
wiley +1 more source
Provable security EPC information service communication scheme for EPC network
To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. By using some cryptographic mechanisms such as the digital signature and the message authentication code ...
Jing-feng LI, Heng PAN, Wei-feng GUO
doaj +2 more sources

