Results 81 to 90 of about 26,946 (315)
Provable security signcryption scheme based on RLWE without trapdoor
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU +3 more
doaj +2 more sources
Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao +3 more
doaj +1 more source
Radical Uncertainty and New Sector Emergence: An Action Theory of Co‐Creative Stakeholders
ABSTRACT For much of the past century, entrepreneurship scholars have sought to understand and assess the nature, role, and impact of uncertainty. While the sum total of this work has contributed valuable insights, radical uncertainty—characterized by dynamic conditions in which outcomes are unknowable at the time action must be taken—remains weakly ...
Parul Manocha +1 more
wiley +1 more source
ABSTRACT Bringing together the literature on policy design, policy capacity and policy making in multilevel systems, this paper argues that the effectiveness of policy design in federal countries depends, ceteris paribus, on the adequacy of federal and local policy capacities.
Giliberto Capano +1 more
wiley +1 more source
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security
Weijia Wang, Lei Hu
doaj +1 more source
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur.
B Wang +12 more
core +1 more source
In response to Chile's public policy to establish a national biodiversity inventory and monitoring system, we launched the HerbarioDigital.cl portal. We have digitised over 120,000 specimens representing more than 3,900 species from two Chilean herbaria, integrating them through a curated local taxonomic index.
Ricardo A. Segovia +5 more
wiley +1 more source
Provable Security of Internet Protocols [PDF]
Secure communications over the Internet are typically established by first running an authenticated key exchange protocol, which computes a secret key between two users, which is then utilised in an encryption protocol. In this work we examine novel security properties of the most prominent communications protocols, including the Transport Layer ...
openaire +2 more sources
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their sensing capabilities.
De Cristofaro, Emiliano +1 more
core +1 more source
ABSTRACT The role of Development Finance Institutions (DFIs) in achieving the Sustainable Development Goals (SDGs) is a topic of growing scholarly importance. While existing literature has mapped the thematic scope of this field, a critical diagnosis of its intellectual structure and inherent biases is missing.
Juan Martinez Alvarez +3 more
wiley +1 more source

