Results 81 to 90 of about 956 (257)
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG +3 more
doaj
ABSTRACT Achieving global sustainability requires rethinking marketing beyond firm centred strategies and towards systemic approaches that engage diverse stakeholders in value co‐creation. This paper proposes a conceptual framework for participatory value co‐creation in sustainable market systems, drawing on stakeholder theory, systems thinking ...
Ahmet Küçükuncular
wiley +1 more source
Abstract Research Summary Upfront payments are important financial resources startups seek to negotiate in technology alliances. This study unpacks how venture‐backed startups can benefit from their VC affiliations and obtain better payments. We develop a bargaining framework and argue that VCs can strengthen venture‐backed startups' hand in alliance ...
Ramakrishna Devarakonda +2 more
wiley +1 more source
Edwards curves based security authentication protocol for mobile RFID systems
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG +3 more
doaj +2 more sources
ABSTRACT This paper examines how legal and institutional frameworks influence bank financing for sustainable innovation among SMEs in the European Union (EU) and African Union (AU). Using institutional theory, it analyzes how coercive, normative, and mimetic pressures interact across international, regional, and domestic levels to shape green lending ...
Priscilla Akua Vitoh
wiley +1 more source
Linearly homomorphic aggregate signature secure in the standard model
Existing lattice-based linear homomorphic signature schemes have difficulty in balancing multi-user aggregation and provable security under the standard model, which limits their practical application in real-world distributed scenarios.
HAN Yiliang +4 more
doaj
Towards provably secure efficiently searchable encryption [PDF]
Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.
openaire +2 more sources
Venture Capital Practices in Saudi Arabia: The Views of Investors
ABSTRACT This study examines how venture capital (VC) investors in Saudi Arabia evaluate, negotiate, and support entrepreneurial ventures in a rapidly developing yet institutionally young setting. Drawing on 21 semi‐structured interviews with 24 investors, it offers rare insight into VC practices in the Middle East.
Tibah al‐Harbi +2 more
wiley +1 more source
Provably Secure Cryptographic Constructions
Modern cryptography has virtually no provably secure constructions. Starting from the first Diffie–Hellman key agreement protocol (Diffie & Hellman, 1976) and the first public key cryptosystemRSA (Rivest et al., 1978), not a single public key cryptographic protocol has been proven secure. Note, however, that there exist secure secret key protocols, e.g.
openaire +3 more sources
ABSTRACT Small and medium‐sized enterprises (SMEs) face significant institutional barriers when expanding across borders, including regulatory constraints, financial accessibility issues, and market entry challenges. Institutional theory provides a useful framework for understanding how external regulative, normative, and cognitive institutional forces
Sharmin Nahar, Muntasir Alam
wiley +1 more source

