Results 61 to 70 of about 1,527 (301)
Provable security signcryption scheme based on RLWE without trapdoor
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU +3 more
doaj +2 more sources
Abstract The sedimentary succession at Whittlesey preserves a unique British late Middle Pleistocene to Holocene record back to a time equivalent to at least marine oxygen isotope stage 8 (ca. 250 ka). This study builds on previously published sedimentology, geochronology and palaeoecology results to establish 20 sedimentary facies associations, with ...
H. E. Langford +3 more
wiley +1 more source
Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao +3 more
doaj +1 more source
Abstract This study explores how social enterprises create social and economic value through business models that support ex‐offenders. The work was motivated by a request for help from an entrepreneur wishing to establish a business that supports ex‐offender rehabilitation.
Elizabeth Green +2 more
wiley +1 more source
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security
Weijia Wang, Lei Hu
doaj +1 more source
An Efficient Conformable Fractional Chaotic Map‐Based Online/Offline IBSS Scheme for Provable Security in ROM [PDF]
Chandrashekhar Meshram +2 more
openalex +1 more source
Radical Uncertainty and New Sector Emergence: An Action Theory of Co‐Creative Stakeholders
ABSTRACT For much of the past century, entrepreneurship scholars have sought to understand and assess the nature, role, and impact of uncertainty. While the sum total of this work has contributed valuable insights, radical uncertainty—characterized by dynamic conditions in which outcomes are unknowable at the time action must be taken—remains weakly ...
Parul Manocha +1 more
wiley +1 more source
ABSTRACT Bringing together the literature on policy design, policy capacity and policy making in multilevel systems, this paper argues that the effectiveness of policy design in federal countries depends, ceteris paribus, on the adequacy of federal and local policy capacities.
Giliberto Capano +1 more
wiley +1 more source
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
In response to Chile's public policy to establish a national biodiversity inventory and monitoring system, we launched the HerbarioDigital.cl portal. We have digitised over 120,000 specimens representing more than 3,900 species from two Chilean herbaria, integrating them through a curated local taxonomic index.
Ricardo A. Segovia +5 more
wiley +1 more source

