Results 81 to 90 of about 27,441 (278)
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security
Weijia Wang, Lei Hu
doaj +1 more source
arXiv admin note: text overlap with arXiv:1310.8038, arXiv:1310 ...
Li, Angsheng, Pan, Yicheng, Zhang, Wei
openaire +2 more sources
Abstract This paper conducts a comparative legal analysis of corporate restructuring frameworks in England and Bhutan, examining their capacity to integrate climate variability considerations and promote sustainable business practices. It discusses the procedural mechanisms for restructuring financially distressed enterprises available under the law of
Eugenio Vaccari, Migmar Lham
wiley +1 more source
Improvement on the XTP public key cryptosystem and communication protocol of provable security
A new trace function was proposed,the XTP public key cryptosystem based on the 3-rd order LFSR se-quence(the so-called XTR3 system) was extended to the XTR4 system based on the 4-th order LFSR sequence.XTR4 key was shorter in length than that of the XTR3
WANG Ze-hui
doaj +2 more sources
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang +4 more
doaj +1 more source
Membership‐Making in Diverse Societies: Revisiting the Idea of Society as a Common Possession
ABSTRACT The traditional aim of Western social democracy has been to create a society that is a ‘common possession’ of its members (in T.H. Marshall's words). Social democratic politics has therefore been both society‐making and membership‐making, orienting people to a shared society as an object of attachment and loyalty, and nurturing membership ...
Will Kymlicka
wiley +1 more source
Provable security EPC information service communication scheme for EPC network
To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. By using some cryptographic mechanisms such as the digital signature and the message authentication code ...
Jing-feng LI, Heng PAN, Wei-feng GUO
doaj +2 more sources
Advances of Provable Security Techniques [PDF]
Yong Yu, Yi Mu
doaj +3 more sources
ABSTRACT In the present study, we investigate the impact of perceived overqualification on the return‐to‐work process following maternity leave. Based on Person‐Environment (P‐E) fit theory's underutilized carryover mechanism, we hypothesized that returning mothers experiencing perceived overqualification would “carry over” their excess abilities to ...
Lisa Boenke +4 more
wiley +1 more source
The NSW and Australian Regional Climate Modelling Version 2.0 (NARCliM2.0) builds on NARCliM1.0 and 1.5 to deliver improved regional climate simulations. This study provides the first comprehensive evaluation of NARCliM2.0 against its predecessors, assessing individual model skill in reproducing mean and extreme climate.
Fei Ji +12 more
wiley +1 more source

