Showing 861 - 880 results of 4,865 for search '"privateering"', query time: 0.09s Refine Results
  1. 861

    Incomes and labor allocation in community forests in Ciamis Regency by Budiman Achmad, Ris Hadi Purwanto, Sambas Sabarnurdin

    Published 2015-07-01
    “…Labor for private forest business has not been considered as an important production factor, which it makes the incomes from the private forests is unfavourable. …”
    Get full text
    Article
  2. 862

    Dynamics Between Foreign Portfolio Investment, Stock Price and Financial Development in South Africa: A SVAR Approach by Kazeem Abimbola Sanusi, Zandri Dickason-Koekemoer

    Published 2025-01-01
    “…The dynamic links between stock prices, financial development, and foreign private investment (FPI) are examined using the SVAR technique. …”
    Get full text
    Article
  3. 863
  4. 864
  5. 865
  6. 866
  7. 867

    Novel hierarchical identity-based encryption scheme from lattice by Qing YE, Ming-xing HU, Yong-li TANG, Kun LIU, Xi-xi YAN

    Published 2017-11-01
    “…Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption (HIBE) schemes,a new HIBE scheme was proposed.The implicit extension method to improve preimage sampling algorithm was used,and then combined the improved algorithm with MP12 trapdoor delegation algorithm to construct an efficient HIBE user’s private key extraction algorithm.Finally,the new extraction algorithm and the Dual-LWE algorithm was integrated to complete the scheme.Compared with the similar schemes,the efficiency of the proposed scheme was improved in system establishment and user’s private key extraction stage,the trapdoor size grows only linearly with the system hierarchical depth,and the improved preimage sample algorithm partly solves the Gaussian parameter increasing problem induced by MP12 trapdoor delegation.The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.…”
    Get full text
    Article
  8. 868

    Politiets infiltration på digitale platforme – set i et menneskeretligt perspektiv by Lene Wacher Lentz

    Published 2019-02-01
    “…In this context, undercover police officers gain access to closed, private forums on the Internet. The current article argues that police infiltration of digital platforms risks violating the right to private life and private communication under Article 8 of the European Convention on Human Rights, and argues that a tighter legal regulation be enacted in this area. …”
    Get full text
    Article
  9. 869

    Traceable attribute-based encryption scheme with key-delegation abuse resistance by Xixi YAN, Xu HE, Tao LIU, Qing YE, Jinxia YU, Yongli TANG

    Published 2020-04-01
    “…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
    Get full text
    Article
  10. 870

    Cultural heritage and flexibilization of touristic production in the eastern Brazilian Amazon by Maria Augusta Freitas Costa Canal, Elcivânia de Oliveira Barreto, Milene de Cássia Santos de Castro

    Published 2024-12-01
    “…The research revealed, through indicators such as entrepreneurship, creative production, privatization, and public-private partnerships, a localized concentration of heritage organization and tourism liberalization in the areas comprising the cities of Macapá (AP), Belém (PA), and São Luís (MA). …”
    Get full text
    Article
  11. 871

    Privacy matching-based service proxy discovery scheme by Kui GENG, Sheng WAN, Feng-hua LI, Yuan-yuan HE, Han-yi WANG

    Published 2016-08-01
    “…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
    Get full text
    Article
  12. 872

    The Optimal PPP Model of Emergency Rescue Service by Guangxi Cao, Ling Zhou

    Published 2021-01-01
    “…Based on the analysis of the shortage of emergency rescue services and the supervision of public-private-partnership (PPP) projects, this paper explores the rent-seeking game predicament and establishes a three-player rent-seeking game model among government regulators, private enterprises, and government agents in the bidding operation of PPP projects by learning from Stackelberg game theory. …”
    Get full text
    Article
  13. 873
  14. 874
  15. 875
  16. 876
  17. 877
  18. 878
  19. 879
  20. 880

    Measuring and Analyzing the Reality of a Pivotal Application (the Educational Institution's Strategy and Governance and Management) According to the Iraqi Institutional Accreditati... by Dhuha Razak Apd, Ali Abdel Karim Al-Saffar, Marwa Mustaph Al-Roubaie

    Published 2023-09-01
    “… The research aims to identify the possibility of measuring and analyzing the reality of the application of institutional accreditation standards in the two surveyed universities (Al-Karkh Science and Al-Farahidi Private University). The problem of the study is examining the applied reality of the axes of institutional accreditation in Iraqi public and private universities. …”
    Get full text
    Article