Results 1 to 10 of about 1,457,511 (283)

ID-based, Proxy, Threshold Signature Scheme [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała   +3 more
doaj   +1 more source

Estimation of Outage Losses Due to Dust Phenomenon [PDF]

open access: yesFaslnāmah-i Pizhūhish/Nāmah-i Iqtisādī, 2023
Climate change and drought have intensified significantly in recent decades across the country, leading to the proliferation of dust storms in various regions, including in Khuzestan province.
Asharaf-sadat Pasandideh   +2 more
doaj   +1 more source

Proxyeconomics, a theory and model of proxy-based competition and cultural evolution

open access: yesRoyal Society Open Science, 2022
Competitive societal systems by necessity rely on imperfect proxy measures. For instance, profit is used to measure value to consumers, patient volumes to measure hospital performance, or the journal impact factor to measure scientific value. While there
Oliver Braganza
doaj   +1 more source

Transparent Rule Enablement Based on Commonization Approach in Heterogeneous IoT Edge Networks

open access: yesSensors, 2023
The paradigm of the Internet of Things (IoT) and edge computing brings a number of heterogeneous devices to the network edge for monitoring and controlling the environment.
Wenquan Jin   +4 more
doaj   +1 more source

Proxy Crimes

open access: yesSSRN Electronic Journal, 2021
“Proxy crimes” is a phrase loosely used to refer to conduct that is punished only as a means to target other harmful conduct. Many criminal law scholars find the criminalization of this type of conduct unjustifiable from a retributivist perspective, while others note that proxy criminalization can contribute to mass incarceration and ...
Bystranowski, Piotr, Mungan, Murat C.
openaire   +2 more sources

Performance Analysis of Proxy-Based Object-Oriented Distributed Systems Using Game Theory [PDF]

open access: yesمدیریت مهندسی و رایانش نرم, 2022
Recently, there has been a remarkable growth of research on the practical applications of game theory in networks, and in particular, the modeling of users’ behavior in distributed and decentralized systems.
Hossein Sadr   +2 more
doaj   +1 more source

A Blueprint for the Estimation of Seagrass Carbon Stock Using Remote Sensing-Enabled Proxies

open access: yesRemote Sensing, 2022
Seagrass ecosystems sequester carbon at disproportionately high rates compared to terrestrial ecosystems and represent a powerful potential contributor to climate change mitigation and adaptation projects. However, at a local scale, rich heterogeneity in
Jamie Simpson   +3 more
doaj   +1 more source

Eco-friendly Database Space Saving Using Proxy Attributes

open access: yesJournal of Computer Science and Technology, 2022
Rapid data growth and inefficient data storage are two concerning issues in green computing. The decision on the eco-friendly technology to use often relies on the amount of carbon footprint produced.
Nurul Emran   +5 more
doaj   +1 more source

Genealogy in Law as a Technology for Categorizing, Contesting and Deconstructing Monoracialism

open access: yesGenealogy, 2022
Contextualized by contestation and deconstruction of monoracialism, this article provides an assessment of how law, as a distinct tool and technology, conceptualizes and operationalizes race and ethnicity.
András L. Pap
doaj   +1 more source

NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network

open access: yesApplied Cybersecurity & Internet Governance, 2022
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements.
Ilies Benhabbour, Marc Dacier
doaj   +1 more source

Home - About - Disclaimer - Privacy