Results 111 to 120 of about 78,996 (280)

Privacy preserving, verifiable and efficient outsourcing algorithm for matrix multiplication to a malicious cloud server

open access: yesCogent Engineering, 2017
Matrix Multiplication is a basic engineering and scientific problem, which has application in various domains. There exists many cryptographic solutions for secure computation of matrix multiplication, but cryptographic preamble makes them infeasible for
Malay Kumar, Jasraj Meena, Manu Vardhan
doaj   +1 more source

Ethical Behaviour and Corporate Financing. The Case of ‘Legality Rating’

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The financial crisis has heightened awareness of ethical and legal issues in the business context. Corporate ethical behaviour is increasingly measured through sustainability ratings. Since 2012, in Italy, the introduction of a sustainability rating, namely the legality rating (LR), has served as an innovative ‘label’ for socially responsible ...
Federica Doni   +3 more
wiley   +1 more source

Digital Product Passports in Fashion: A Strategic Framework for Implementation

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This study investigates the role of the Digital Product Passport (DPP) in promoting transparency, traceability, and sustainability within the fashion industry. As the fashion sector faces significant environmental and social challenges, including resource depletion, pollution, and unethical labor practices, the DPP offers a potential solution ...
Laura Macchion
wiley   +1 more source

Questionary Research to Learn State of Affairs of Technological Support CRM [PDF]

open access: yes
Evaluation exercise was made on the basis primary research in which service organizations was spoken. They were answered for questions interrelated to customer relationship management (CRM).CRM, hypothesis, exploited software, cooperative part CRM ...
Suchánek, Petr, Vaněk, Jindřich
core   +1 more source

Bridging Cross‐Scale Science–Policy Interfaces for Coherent Land‐Use Governance: Knowledge Co‐Production and Uptake in Kenya's Polycentric System

open access: yesEnvironmental Policy and Governance, EarlyView.
ABSTRACT Land is fundamental to livelihoods and ecosystem health but faces mounting pressure from human activities, climate change, and competing development demands. Science–policy interfaces (SPIs)—platforms that connect experts and policymakers—are vital for co‐producing knowledge to inform coherent, sustainable land‐use governance.
Sara Velander   +1 more
wiley   +1 more source

Governing Within the Constraints of Carbon Budgets: Regional Insights From Sweden

open access: yesEnvironmental Policy and Governance, EarlyView.
ABSTRACT Staying within the limits of a rapidly shrinking global carbon budget while avoiding dependency on negative emissions technologies and carbon dioxide removal remains a significant challenge in a multi‐level governance system, where resources and responsibilities are dispersed among different actors.
Paula Lenninger, Magdalena Kuchler
wiley   +1 more source

Selective Homomorphic Encryption With LLE Enhances Privacy and Scalability in Doorbell Face Recognition

open access: yesIEEE Access
The rapid adoption of smart-home and Internet-of-Things (IoT) devices has intensified the need for privacy-preserving biometric authentication that is both secure and computationally efficient.
Raniyah Wazirali   +2 more
doaj   +1 more source

Orchestration of Climate Action in Municipalities: A Collective Capacity Approach

open access: yesEnvironmental Policy and Governance, EarlyView.
ABSTRACT Municipalities are increasingly positioned as key actors in enabling local climate action, yet their ability to mobilise societal actors remains insufficiently understood. This study examines how municipal officials in six Finnish municipalities from different local contexts understand and operationalise collective capacity for climate action,
Maija Faehnle   +2 more
wiley   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

The Distributive Consequences of Active Welfare Policies in Europe

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT This article examines the distributive consequences of active welfare policies in Europe by analysing tier‐specific investments in individualised employment services across four European welfare states: Denmark, Germany, the Netherlands and the United Kingdom.
Deborah Jackwerth‐Rice   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy