Results 81 to 90 of about 956 (257)

Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud

open access: yesTongxin xuebao, 2021
To solve the problem of multi-source IoT data integrity verification, identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly, the formal definitions of system model and security model of ID ...
Huaqun WANG   +3 more
doaj  

Participatory Value Co‐Creation in Sustainable Market Systems: A Framework for Systemic Marketing Redesign

open access: yesSustainable Development, EarlyView.
ABSTRACT Achieving global sustainability requires rethinking marketing beyond firm centred strategies and towards systemic approaches that engage diverse stakeholders in value co‐creation. This paper proposes a conceptual framework for participatory value co‐creation in sustainable market systems, drawing on stakeholder theory, systems thinking ...
Ahmet Küçükuncular
wiley   +1 more source

Upfront payments to venture‐backed startups in technology alliances: Bargaining effects of VC affiliations

open access: yesStrategic Entrepreneurship Journal, EarlyView.
Abstract Research Summary Upfront payments are important financial resources startups seek to negotiate in technology alliances. This study unpacks how venture‐backed startups can benefit from their VC affiliations and obtain better payments. We develop a bargaining framework and argue that VCs can strengthen venture‐backed startups' hand in alliance ...
Ramakrishna Devarakonda   +2 more
wiley   +1 more source

Edwards curves based security authentication protocol for mobile RFID systems

open access: yesTongxin xuebao, 2014
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG   +3 more
doaj   +2 more sources

Banking on Sustainable Innovation: A Comparative Analysis of Institutional and Regulatory Frameworks for SME Finance in the EU and African Union

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT This paper examines how legal and institutional frameworks influence bank financing for sustainable innovation among SMEs in the European Union (EU) and African Union (AU). Using institutional theory, it analyzes how coercive, normative, and mimetic pressures interact across international, regional, and domestic levels to shape green lending ...
Priscilla Akua Vitoh
wiley   +1 more source

Linearly homomorphic aggregate signature secure in the standard model

open access: yesTongxin xuebao
Existing lattice-based linear homomorphic signature schemes have difficulty in balancing multi-user aggregation and provable security under the standard model, which limits their practical application in real-world distributed scenarios.
HAN Yiliang   +4 more
doaj  

Towards provably secure efficiently searchable encryption [PDF]

open access: yes, 2012
Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.
openaire   +2 more sources

Venture Capital Practices in Saudi Arabia: The Views of Investors

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT This study examines how venture capital (VC) investors in Saudi Arabia evaluate, negotiate, and support entrepreneurial ventures in a rapidly developing yet institutionally young setting. Drawing on 21 semi‐structured interviews with 24 investors, it offers rare insight into VC practices in the Middle East.
Tibah al‐Harbi   +2 more
wiley   +1 more source

Provably Secure Cryptographic Constructions

open access: yes, 2012
Modern cryptography has virtually no provably secure constructions. Starting from the first Diffie–Hellman key agreement protocol (Diffie & Hellman, 1976) and the first public key cryptosystemRSA (Rivest et al., 1978), not a single public key cryptographic protocol has been proven secure. Note, however, that there exist secure secret key protocols, e.g.
openaire   +3 more sources

Technology‐Enabled Cross‐Border Entrepreneurship: The Role of Digital Platforms in SME Expansion Through the Lens of Institutional Theory

open access: yesThunderbird International Business Review, EarlyView.
ABSTRACT Small and medium‐sized enterprises (SMEs) face significant institutional barriers when expanding across borders, including regulatory constraints, financial accessibility issues, and market entry challenges. Institutional theory provides a useful framework for understanding how external regulative, normative, and cognitive institutional forces
Sharmin Nahar, Muntasir Alam
wiley   +1 more source

Home - About - Disclaimer - Privacy