Results 1 to 10 of about 1,457,511 (283)
ID-based, Proxy, Threshold Signature Scheme [PDF]
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used
Jacek Pomykała +3 more
doaj +1 more source
Estimation of Outage Losses Due to Dust Phenomenon [PDF]
Climate change and drought have intensified significantly in recent decades across the country, leading to the proliferation of dust storms in various regions, including in Khuzestan province.
Asharaf-sadat Pasandideh +2 more
doaj +1 more source
Proxyeconomics, a theory and model of proxy-based competition and cultural evolution
Competitive societal systems by necessity rely on imperfect proxy measures. For instance, profit is used to measure value to consumers, patient volumes to measure hospital performance, or the journal impact factor to measure scientific value. While there
Oliver Braganza
doaj +1 more source
Transparent Rule Enablement Based on Commonization Approach in Heterogeneous IoT Edge Networks
The paradigm of the Internet of Things (IoT) and edge computing brings a number of heterogeneous devices to the network edge for monitoring and controlling the environment.
Wenquan Jin +4 more
doaj +1 more source
“Proxy crimes” is a phrase loosely used to refer to conduct that is punished only as a means to target other harmful conduct. Many criminal law scholars find the criminalization of this type of conduct unjustifiable from a retributivist perspective, while others note that proxy criminalization can contribute to mass incarceration and ...
Bystranowski, Piotr, Mungan, Murat C.
openaire +2 more sources
Performance Analysis of Proxy-Based Object-Oriented Distributed Systems Using Game Theory [PDF]
Recently, there has been a remarkable growth of research on the practical applications of game theory in networks, and in particular, the modeling of users’ behavior in distributed and decentralized systems.
Hossein Sadr +2 more
doaj +1 more source
A Blueprint for the Estimation of Seagrass Carbon Stock Using Remote Sensing-Enabled Proxies
Seagrass ecosystems sequester carbon at disproportionately high rates compared to terrestrial ecosystems and represent a powerful potential contributor to climate change mitigation and adaptation projects. However, at a local scale, rich heterogeneity in
Jamie Simpson +3 more
doaj +1 more source
Eco-friendly Database Space Saving Using Proxy Attributes
Rapid data growth and inefficient data storage are two concerning issues in green computing. The decision on the eco-friendly technology to use often relies on the amount of carbon footprint produced.
Nurul Emran +5 more
doaj +1 more source
Genealogy in Law as a Technology for Categorizing, Contesting and Deconstructing Monoracialism
Contextualized by contestation and deconstruction of monoracialism, this article provides an assessment of how law, as a distinct tool and technology, conceptualizes and operationalizes race and ethnicity.
András L. Pap
doaj +1 more source
NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements.
Ilies Benhabbour, Marc Dacier
doaj +1 more source

