Suggested Topics within your search.
Suggested Topics within your search.
- Economic aspects 2
- Leadership 2
- Public-private sector cooperation 2
- Trusts and trustees 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Administrative law 1
- Agricultural industries 1
- Agriculture 1
- Business networks 1
- Civil law 1
- Climate Change 1
- Community development 1
- Digital techniques 1
- Digitale Photographie 1
- Domestic relations 1
- Economic conditions 1
- Economic development 1
- Economic policy 1
- Education, Higher 1
- Ego (Psychology) 1
- Environmental Health 1
- Equity 1
- Evaluation 1
- Families 1
- Fiction 1
- Foreign trade regulation 1
- General 1
- Hastings, Stanley (Fictitious character) 1
- Health insurance 1
- Health insurance claims 1
-
861
Incomes and labor allocation in community forests in Ciamis Regency
Published 2015-07-01“…Labor for private forest business has not been considered as an important production factor, which it makes the incomes from the private forests is unfavourable. …”
Get full text
Article -
862
Dynamics Between Foreign Portfolio Investment, Stock Price and Financial Development in South Africa: A SVAR Approach
Published 2025-01-01“…The dynamic links between stock prices, financial development, and foreign private investment (FPI) are examined using the SVAR technique. …”
Get full text
Article -
863
Impact of National HIV and AIDS Communication Campaigns in South Africa to Reduce HIV Risk Behaviour
Published 2012-01-01Get full text
Article -
864
-
865
Conductive Composite Biosensor System for Electrochemical Indinavir Drug Detection
Published 2015-01-01Get full text
Article -
866
-
867
Novel hierarchical identity-based encryption scheme from lattice
Published 2017-11-01“…Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption (HIBE) schemes,a new HIBE scheme was proposed.The implicit extension method to improve preimage sampling algorithm was used,and then combined the improved algorithm with MP12 trapdoor delegation algorithm to construct an efficient HIBE user’s private key extraction algorithm.Finally,the new extraction algorithm and the Dual-LWE algorithm was integrated to complete the scheme.Compared with the similar schemes,the efficiency of the proposed scheme was improved in system establishment and user’s private key extraction stage,the trapdoor size grows only linearly with the system hierarchical depth,and the improved preimage sample algorithm partly solves the Gaussian parameter increasing problem induced by MP12 trapdoor delegation.The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.…”
Get full text
Article -
868
Politiets infiltration på digitale platforme – set i et menneskeretligt perspektiv
Published 2019-02-01“…In this context, undercover police officers gain access to closed, private forums on the Internet. The current article argues that police infiltration of digital platforms risks violating the right to private life and private communication under Article 8 of the European Convention on Human Rights, and argues that a tighter legal regulation be enacted in this area. …”
Get full text
Article -
869
Traceable attribute-based encryption scheme with key-delegation abuse resistance
Published 2020-04-01“…Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be shared to all user private key components corresponding to attributes,and the decryption was completed by using all these components together,such that only parts of them could not realize the decryption and the real key-delegation abuse resistance ability was be obtained consequently.A short signature technique was employed to prevent the tracing parameter embedded in a user private key from being forged,so as to achieve the traceability of the user who leaked his user private key.Supporting both key-delegation abuse resistance and user tracing enhances the security of the proposed scheme.And compared with related schemes,the proposed scheme has better advantage in terms of the parameters size and the computation cost.…”
Get full text
Article -
870
Cultural heritage and flexibilization of touristic production in the eastern Brazilian Amazon
Published 2024-12-01“…The research revealed, through indicators such as entrepreneurship, creative production, privatization, and public-private partnerships, a localized concentration of heritage organization and tourism liberalization in the areas comprising the cities of Macapá (AP), Belém (PA), and São Luís (MA). …”
Get full text
Article -
871
Privacy matching-based service proxy discovery scheme
Published 2016-08-01“…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
Get full text
Article -
872
The Optimal PPP Model of Emergency Rescue Service
Published 2021-01-01“…Based on the analysis of the shortage of emergency rescue services and the supervision of public-private-partnership (PPP) projects, this paper explores the rent-seeking game predicament and establishes a three-player rent-seeking game model among government regulators, private enterprises, and government agents in the bidding operation of PPP projects by learning from Stackelberg game theory. …”
Get full text
Article -
873
-
874
Factors Affecting the Digestibility of Beef and Consequences for Designing Meat-Centric Meals
Published 2019-01-01Get full text
Article -
875
-
876
-
877
-
878
-
879
Early prediction of Li-ion cell failure from EIS derived from current–voltage time series
Published 2025-01-01Get full text
Article -
880
Measuring and Analyzing the Reality of a Pivotal Application (the Educational Institution's Strategy and Governance and Management) According to the Iraqi Institutional Accreditati...
Published 2023-09-01“… The research aims to identify the possibility of measuring and analyzing the reality of the application of institutional accreditation standards in the two surveyed universities (Al-Karkh Science and Al-Farahidi Private University). The problem of the study is examining the applied reality of the axes of institutional accreditation in Iraqi public and private universities. …”
Get full text
Article