Results 81 to 90 of about 27,441 (278)

A Secure and Efficient Handover Authentication Protocol for Wireless Networks

open access: yesSensors, 2014
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security
Weijia Wang, Lei Hu
doaj   +1 more source

Provable Security of Networks

open access: yes, 2013
arXiv admin note: text overlap with arXiv:1310.8038, arXiv:1310 ...
Li, Angsheng, Pan, Yicheng, Zhang, Wei
openaire   +2 more sources

Towards climate‐conscious corporate restructuring: A comparative exploration of English and Bhutanese legal frameworks

open access: yesInternational Insolvency Review, EarlyView.
Abstract This paper conducts a comparative legal analysis of corporate restructuring frameworks in England and Bhutan, examining their capacity to integrate climate variability considerations and promote sustainable business practices. It discusses the procedural mechanisms for restructuring financially distressed enterprises available under the law of
Eugenio Vaccari, Migmar Lham
wiley   +1 more source

Improvement on the XTP public key cryptosystem and communication protocol of provable security

open access: yesTongxin xuebao, 2007
A new trace function was proposed,the XTP public key cryptosystem based on the 3-rd order LFSR se-quence(the so-called XTR3 system) was extended to the XTR4 system based on the 4-th order LFSR sequence.XTR4 key was shorter in length than that of the XTR3
WANG Ze-hui
doaj   +2 more sources

Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud

open access: yesIEEE Access, 2018
Cloud and remote storage, which has become the preferred method for reducing the security risk and safeguarding our data, is widely used for backups or outsourcing.
Jianyi Zhang   +4 more
doaj   +1 more source

Membership‐Making in Diverse Societies: Revisiting the Idea of Society as a Common Possession

open access: yesJournal of Applied Philosophy, EarlyView.
ABSTRACT The traditional aim of Western social democracy has been to create a society that is a ‘common possession’ of its members (in T.H. Marshall's words). Social democratic politics has therefore been both society‐making and membership‐making, orienting people to a shared society as an object of attachment and loyalty, and nurturing membership ...
Will Kymlicka
wiley   +1 more source

Provable security EPC information service communication scheme for EPC network

open access: yesTongxin xuebao, 2013
To resolve the security drawbacks of EPC information services, a provable security EPC information service communication scheme—ESCM was designed. By using some cryptographic mechanisms such as the digital signature and the message authentication code ...
Jing-feng LI, Heng PAN, Wei-feng GUO
doaj   +2 more sources

Advances of Provable Security Techniques [PDF]

open access: yesJournal of Universal Computer Science, 2019
Yong Yu, Yi Mu
doaj   +3 more sources

Back to Work! Perceived Overqualification, Proactive Helping Behaviors, and Work Adjustment Among Reentering Mothers

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT In the present study, we investigate the impact of perceived overqualification on the return‐to‐work process following maternity leave. Based on Person‐Environment (P‐E) fit theory's underutilized carryover mechanism, we hypothesized that returning mothers experiencing perceived overqualification would “carry over” their excess abilities to ...
Lisa Boenke   +4 more
wiley   +1 more source

Three Generations of NARCliM: Evaluation of Precipitation, Temperature and Their Extremes Over the CORDEX Australasia Domain

open access: yesInternational Journal of Climatology, EarlyView.
The NSW and Australian Regional Climate Modelling Version 2.0 (NARCliM2.0) builds on NARCliM1.0 and 1.5 to deliver improved regional climate simulations. This study provides the first comprehensive evaluation of NARCliM2.0 against its predecessors, assessing individual model skill in reproducing mean and extreme climate.
Fei Ji   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy