Showing 81 - 100 results of 4,865 for search '"privateering"', query time: 0.06s Refine Results
  1. 81
  2. 82

    Private Wells 101: Bacterial Contamination and Shock Chlorination by Yilin Zhuang, Mary Lusk

    Published 2021-02-01
    “… Private well users are responsible for the management and protection of their wells. …”
    Get full text
    Article
  3. 83
  4. 84

    Verifiably private outsourcing scheme for multivariate polynomial evaluation by Yan-li REN, Da-wu GU, Jian-xing CAI, Chun-shui HUANG

    Published 2015-08-01
    “…With the development of cloud computing and big data,it had important practical significance for how to outsource private data and verify the computing result efficiently.A verifiably outsourcing scheme for multivariate polynomial evaluation based on multilinear maps and homomorphic encryption was proposed where the user could verify the computing result exactly.The proposed scheme is provably secure without random oracles and the multivariate polynomial itself and the input of the function are private for the server.Moreover,the cost of the user is much smaller than that of the server,and it is much smaller than that of computing the multivariate polynomial directly.…”
    Get full text
    Article
  5. 85

    Public-Private Partnerships in Republic of Korea: Experience and Results by Lee Jae Sung

    Published 2015-06-01
    Subjects: “…public-private partnership in korea…”
    Get full text
    Article
  6. 86
  7. 87

    Bloom filter-based lightweight private matching scheme by Sheng WAN, Yuan-yuan HE, Feng-hua LI, Ben NIU, Hui LI, Xin-yu WANG

    Published 2015-12-01
    “…With rapid developments of mobile devices and online social networks,users of proximity-based mobile social networks (PMSN) could easily discover and make new social interactions with others,but they enjoyed this kind of conveniences at the cost of user privacy and system overhead,etc.To address this problem,a third party free and lightweight scheme to privately match the similarity with potential friends in vicinity was proposed.Unlike most existing work,proposed scheme considered both the number of common attributes and the corresponding priorities on each of them individually.The Bloom filter-based common-attributes estimation and the lightweight confusion binary vector scalar product protocol reduce the system overhead significantly,and can resist against brute force attack and unlimited input attack.The correctness,security and performance of overhead of proposed scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
    Get full text
    Article
  8. 88
  9. 89
  10. 90

    Research on 5G private networking schemes for industry by Shilei DONG, Jingbo ZHAO

    Published 2021-11-01
    Subjects: “…5G private networking…”
    Get full text
    Article
  11. 91

    Technology of the information and communication in public and private schools in Arequipa by Walter Lizandro Arias Gallegos

    Published 2015-01-01
    “…In this study we made a frequency and percentage analysis of TIC in Arequipa City (Peru) in order to identify the most frequent ICTs in school context and settle a comparison between private and public schools. It was designed a survey and applied in 83 schools (51 private y 32 public) that were selected by probabilistic methods. …”
    Get full text
    Article
  12. 92
  13. 93
  14. 94
  15. 95
  16. 96
  17. 97
  18. 98

    Medical marketing in healthcare institutions with public-private partnership mechanisms by А.V. Ivaniuk

    Published 2023-06-01
    Subjects: “…public-private partnerships…”
    Get full text
    Article
  19. 99
  20. 100