Showing 2,521 - 2,540 results of 4,865 for search '"privateer"', query time: 0.06s Refine Results
  1. 2521

    Analysis and improvement on identity-based cloud data integrity verification scheme by Shaohui WANG, Xiaoxiao PAN, Zhiwei WANG, Fu XIAO, Ruchuan WANG

    Published 2018-11-01
    “…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
    Get full text
    Article
  2. 2522

    Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining by Chun-Wei Lin, Tzung-Pei Hong, Hung-Chuan Hsu

    Published 2014-01-01
    “…Data mining is traditionally adopted to retrieve and analyze knowledge from large amounts of data. Private or confidential data may be sanitized or suppressed before it is shared or published in public. …”
    Get full text
    Article
  3. 2523

    Reasons Behind the Migration of Highly Qualified Employees from Turkiye: The Case of Software Developers and Engineers by Mustafa Şeref Akın, Ebubekir Karadaş

    Published 2023-12-01
    “…They express that companies in their destination countries respect their work, private lives, and individuality. To address this issue, Turkish companies can consider measures such as assisting key employees in purchasing houses and cars, as well as supporting their families’ education and healthcare expenses, to ensure long-term loyalty. …”
    Get full text
    Article
  4. 2524

    Attribute generalization mix-zone based on multiple secure computation by Bin WANG, Lei ZHANG, Guoyin ZHANG

    Published 2019-04-01
    “…In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks,based on the conception of attribute generalization and the methods of homomorphic encryption,a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed.The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent,and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end.With the help of fully attribute generalization,this method can solve the problem of users can be tracked by the potential attributes,and at the same time the privacy calculation also does not reveal any information to participants,so this method can prevent the disguised attacker that obtains user’s information in mix-zone.At last,in order to demonstrate the superiority of the proposed method in both of academically and practicality,the security analysis and experimental verification are given,and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method.…”
    Get full text
    Article
  5. 2525

    O impacto da realização da Copa das Confederações da FIFA de 2013 e da Copa do Mundo da FIFA de 2014 na criminalidade em Belo Horizonte by Alexandre Magno Alves Diniz, Ludmila Lopes Ribeiro, Ricardo Henrique Palhares

    Published 2017-10-01
    “…This article examines, from a comparative basis the geographical incidence of robberies, thefts and damage to public and private property in Belo Horizonte, taking into account the recent historical evolution of crimes that occur during major events. …”
    Get full text
    Article
  6. 2526

    Mapping Antibiotic-Resistant Neisseria Gonorrhoeae Isolates in Metropolitan Toronto: Issues of Scale, Positional Accuracy and Confidentiality by Jody F Decker, Bob Sharpe, Jo-Anne R Dillon

    Published 1997-01-01
    “…The reporting locations of N gonorrhoeae isolates submitted from hospitals, doctor’s offices, private and provincial laboratories, and sexually transmitted disease (STD) clinics were used as a model. …”
    Get full text
    Article
  7. 2527

    Parameter Evaluation for a Statistical Mechanical Model for Binary Choice with Social Interaction by Alex Akwasi Opoku, Godwin Osabutey, Charles Kwofie

    Published 2019-01-01
    “…The model has a social and a private incentive part with coefficients measuring the influence individuals have on each other and the external influence on individuals, respectively. …”
    Get full text
    Article
  8. 2528

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article
  9. 2529

    Crimillegal Orders: Revisiting Organized Crime’s Political Power by Markus Schultze-Kraft

    Published 2016-05-01
    “…Taking recourse to the conceptions of political order put forward by Weber, Fukuyama and North, Wallis and Weingast, I explain how regular patterns of social exchange and interaction - involving public and private, and state and non-state actors - that span an assumed divide between the realms of legality (“legitimate upper world”) and criminality (“illegitimate underworld”) influence the character, shape and evolution of political order. …”
    Get full text
    Article
  10. 2530

    Mathematical Modeling of the Propagation of Democratic Support of Extreme Ideologies in Spain: Causes, Effects, and Recommendations for Its Stop by E. De la Poza, L. Jódar, A. Pricop

    Published 2013-01-01
    “…By considering the dynamic subpopulations transits built throughout data obtained from public and private prestigious institutions and sociopolitical analysis, a system of difference equations models the electoral population behavior in Spain allowing us to compute the expected electoral support in the time horizon of January 2016. …”
    Get full text
    Article
  11. 2531

    Parenting Styles and the Development of Socio-Emotional Regulation Skills in Preschool Children by Rahmatallahi Taiye Ojibara

    Published 2024-10-01
    “…Two hundred (200) Preschool respondents were randomly selected from ten (10) pre-primary schools; five (5) public and five (5) private schools. Parenting Styles Questionnaire (PSQ) and a self-Constructed Rating Scale for preschool Children's Socio-Emotional Rating Scale (PCSRS) were used to elicit information about the preschool parents' parenting styles and the rate scale for evaluation about their Socio-Emotional Skills displayed in the classroom. …”
    Get full text
    Article
  12. 2532

    Pouvoir et opposition en Algérie : vers une transition prolongée ? by Louisa Dris-Aït Hamadouche, Yahia H. Zoubir

    Published 2009-11-01
    “…The opening initiated by the authorities between 1989 and 1991 resulted in the emergence of a pluralistic and dynamic opposition, able to express itself through sixty “political associations” and dozens of private and public newspapers. In practice, often intense and conflicting political debates were conveyed through demonstrations and rallies, thus providing an assessment of public opinion. …”
    Get full text
    Article
  13. 2533

    Blockchain-Based Anonymous Reputation System for Performance Appraisal by Hye Jin Lee, Duc Anh Luong, Jong Hwan Park, Hyoseung Kim

    Published 2025-01-01
    “…Although blockchain-based anonymous reputation systems have been discussed, permissioned blockchains are susceptible to Sybil attack vulnerabilities, while permissionless private blockchains do not provide full anonymity. …”
    Get full text
    Article
  14. 2534

    Estado y representación política en Brasil by Helcimara De Souza Telles

    Published 2008-11-01
    “…The difficulty faced by the political parties in taking root amidst society may have been caused by the strategic role played by the federal government, which generated the supremacy of the Executive branch over the Legislative, which in turn allowed the State’s permeability to private interests. The Brazilian parties are currently viewed as lacking discipline and representativeness. …”
    Get full text
    Article
  15. 2535

    Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service by Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Jie Guo

    Published 2017-01-01
    “…In this paper, we propose an efficient private circular query protocol (EPCQP) with high accuracy rate and low computation and communication cost. …”
    Get full text
    Article
  16. 2536

    Integrating Logistics and Information Systems in Urban Waste Management: The Road to a Sustainable Smart City by Koman Gabriel, Krúpová Silvia

    Published 2025-01-01
    “…This article also highlights the need for coordinated cooperation between the public and private sectors, as well as the importance of a legislative framework that promotes technological innovation and environmental sustainability. …”
    Get full text
    Article
  17. 2537

    How does the wealth level of nations affect their COVID-19 vaccination plans? by Bilal Kargı, Mario Coccia, Bekir Cihan Uçkaç

    Published 2023-11-01
    “…In this context, manifold countries are implementing restrictions and bureaucratic rules, such as green pass/vaccine reports, to boost vaccination levels by regulating various public and private life aspects that potentially impact individuals' well-being. …”
    Get full text
    Article
  18. 2538

    Homomorphic encryption location privacy-preserving scheme based on Markov model by Kai ZHOU, Chang-gen PENG, Yi-jie ZHU, Jian-qiong HE

    Published 2017-01-01
    “…Meanwhile, the computability and confidentiality of homomorphic encryption ciphertext were used to realize the statistical analysis of cipher-text-oriented data and the secure storage of private data.…”
    Get full text
    Article
  19. 2539

    Human rights to Internet access and its safe use by V. V. Popov, P. I. Moskalenko, S. V. Cherkasova

    Published 2022-09-01
    “…The methodological and theoretical basis of the research are private and general scientific approaches to the study of this topic. …”
    Get full text
    Article
  20. 2540

    Du sol foncier au sol vivant by Atelier Georges, Thibault Barbier, Mathieu Delorme, Charles Rives

    Published 2022-12-01
    “…This article is based on our practice of urban planning and landscape projects with public and private sector clients. We start by proposing a new representation of the soil as a tool in landscape architecture: the "land" becomes "living soil". …”
    Get full text
    Article