Results 71 to 80 of about 27,441 (278)
Seeking Anonymity in an Internet Panopticon
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the ...
Feigenbaum, Joan, Ford, Bryan
core +1 more source
How Consumers Contest Legitimacy: Skepticism Toward Corporate Social Responsibility
ABSTRACT Consumer skepticism toward Corporate Social Responsibility (CSR) initiatives operates not only as an individual‐level response but also as a societal governance mechanism that disciplines firms and reshapes organizational legitimacy. Drawing on in‐depth interviews with consumers in an emerging Latin American economy, this study advances an ...
Francine Zanin Bagatini +2 more
wiley +1 more source
Optimal sequential fingerprinting: Wald vs. Tardos
We study sequential collusion-resistant fingerprinting, where the fingerprinting code is generated in advance but accusations may be made between rounds, and show that in this setting both the dynamic Tardos scheme and schemes building upon Wald's ...
Chernoff H. +8 more
core +1 more source
Sustainability Disclosure and External Assurance of Reports in the Italian Agrifood Sector
ABSTRACT The European Union introduced the Corporate Sustainability Reporting Directive (CSRD) with the aim of aligning the “walk”—the implementation of substantive sustainability practices—and the “talk”—their representation in sustainability reporting.
Andrea Caccialanza +2 more
wiley +1 more source
Practical Provably Secure Flooding for Blockchains
Advances in Cryptology – ASIACRYPT ...
Chen-Da Liu-Zhang +4 more
openaire +3 more sources
ABSTRACT This study investigates the integration of circular economy (CE) and lean management (LM) as a strategic approach for enhancing corporate efficiency and sustainability. While CE emphasizes resource circularity, LM focuses on waste elimination and value maximization in production processes.
Pedro Carmona Marques +2 more
wiley +1 more source
Provable security signcryption scheme based on RLWE without trapdoor
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU +3 more
doaj +2 more sources
ABSTRACT China's environmental governance transition combines intensified vertical accountability and performance‐based management with expanding calls for public participation. However, despite growing demand for civic engagement, there remains limited understanding of how participatory environmental initiatives are structured and governed in practice.
Linjun Xie, Mengqi Shao, Gaohan Deng
wiley +1 more source
The Distributive Consequences of Active Welfare Policies in Europe
ABSTRACT This article examines the distributive consequences of active welfare policies in Europe by analysing tier‐specific investments in individualised employment services across four European welfare states: Denmark, Germany, the Netherlands and the United Kingdom.
Deborah Jackwerth‐Rice +1 more
wiley +1 more source
Abstract Soft robots, engineered from highly compliant materials, offer superior adaptability and safety in unstructured environments compared to their rigid counterparts. Recent advancements, fueled by bio‐inspiration and material programmability, have led to the rapid co‐evolution of their core modules: actuation, sensing, protection, energy, and ...
Qiulei Liu +3 more
wiley +1 more source

