Results 81 to 90 of about 1,527 (301)
Abstract Research Summary Upfront payments are important financial resources startups seek to negotiate in technology alliances. This study unpacks how venture‐backed startups can benefit from their VC affiliations and obtain better payments. We develop a bargaining framework and argue that VCs can strengthen venture‐backed startups' hand in alliance ...
Ramakrishna Devarakonda +2 more
wiley +1 more source
On the Security of Wang's Provably Secure Identity-based Key Agreement\n Protocol [PDF]
Maurizio Adriano Strangio
openalex +1 more source
Provable Security Against a Differential Attack
The purpose of this paper is to show that there exist DES-like iterated ciphers, which are provably resistant against differential attacks. The main result on the security of a DES-like cipher with independent round keys is Theorem 1, which gives an upper bound to the probability of <em>s</em>-round differentials, as defined in <em> ...
Nyberg, Kaisa, Knudsen, Lars Ramkilde
openaire +2 more sources
Abstract Research Summary This research investigates how firms attempt to preempt activism before it mobilizes into an active threat. Employing a difference‐in‐differences design, we examine the quasi‐exogenous enactments of laws that prevent Strategic Lawsuits Against Public Participation (anti‐SLAPP laws) in the United States.
Zhiyan Wu, Garry Bruton, Ryan Krause
wiley +1 more source
ABSTRACT This paper examines how legal and institutional frameworks influence bank financing for sustainable innovation among SMEs in the European Union (EU) and African Union (AU). Using institutional theory, it analyzes how coercive, normative, and mimetic pressures interact across international, regional, and domestic levels to shape green lending ...
Priscilla Akua Vitoh
wiley +1 more source
Provable Security for the Onion Routing and Mix Network Packet Format Sphinx [PDF]
Philip C. Scherer +2 more
openalex +1 more source
Why Provable Security Matters? [PDF]
Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging standards. This in turn has led researchers as well as practitioners to raise some concerns about this methodology.
openaire +1 more source
The Growing Pain of Animal Welfare Weaponization: Get the Ghost Out of the Machine
ABSTRACT Managing for positive animal welfare is recognized as a fundamental zoo and aquarium practice. Indeed, many zoo and aquarium associations now have expectations that their members demonstrate achievement of some level of positive welfare for their charges.
David M. Powell, Jason V. Watters
wiley +1 more source
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG +3 more
doaj
The Price Gap in Agriculture‐Based Greenhouse Gas Offset Markets
ABSTRACT Today, there is a global effort to reduce greenhouse gas net emissions (GHGNE). For economic well‐being, it is important to identify low‐cost means of net emission offsets. Agriculture and forestry have received considerable attention as a means of supplying emissions offsets, as they contribute nearly 20% of global emissions.
Jingyi W. Liu +2 more
wiley +1 more source

