نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

2015
Kathy Ning Shen

Identity-related processes have been identified as important in explaining virtual community (VC) member behavior as well as informing system design of VCs. In particular, the two distinct identity processes of self-verification and identification have been identified and investigated separately, portrayed as two distinctive or contradictory identity processes with different practical implicati...

2005
P. C. van Oorschot Stuart G. Stubblebine

We define identity theft as the unauthorized use and exploitation of another individual’s identity-corroborating information. Published research proposing technical countermeasures is sparse, in contrast to a number of recent proposals to address the sub-problem of phishing. We first identify some underlying problems facilitating identity theft. To address identity theft and the use of stolen o...

2011
Joseph K. Liu Cheng-Kang Chu Jianying Zhou

Identity-Based Cryptosystem plays an important role in the modern cryptography world, due to the elimination of the costly certificate. However, all practical identity-based encryption schemes require pairing operation in the decryption stage. Pairing is a heavy mathematical algorithm, especially for resource-constrained devices such as smart cards or wireless sensors. In other words, decryptio...

2003
Yew-Jin Lee Wolff-Michael Roth Leanna Boyer

Expert practical knowledge emerges through sustained participation in some community of practice. However, participation alone is not the sole factor that contributes to high levels of expertise in the workplace. Our multi-year ethnographic study of one fish hatchery and associated activity systems shows that deeper experiential (practical) and conceptual (scientific) knowledge emerged when fis...

2010
Anssi Hoikkanen Margherita Bacigalupo Wainer Lusoli Ioannis Maghiros Stavri G. Nikolov

This paper discusses the economics of electronic identity (eIdentity) from both theoretical and practical perspectives. Personal identity data are becoming increasingly important in online transactions, and they have never been monetised to the extent they are today. Consequently, there is a need for an improved understanding of the economic externalities resulting from the electronic use of id...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

after the soviet union dissolution, a chaotic period was begun in the russia. russia lost its glory and felt disgrace. the first group of elites came to power under yeltsin; they tried to re-define russia’s identity as a european country and build a foreign policy on this baseline. therefore russia tried to become closer with the west especially with the u.s. according to their view the sovie...

2004
Pascal Costanza

The object-oriented paradigm is one of the central programming paradigms of our time. The following description is a generally accepted characterization of that paradigm: “An object has state, behavior, and identity” [9]. The concept of object identity plays an important role here insofar it is the only characteristic element that is not available in purely declarative programming languages wit...

Journal: :I. J. Network Security 2006
Xiangguo Cheng Lifeng Guo Xinmei Wang

It has always been a critical issue to find efficient methods for fast revocation of a user’s identity in identity (ID)based cryptosystems. Unfortunately, none of the previous ID-based cryptography can find a practical way. Libert et al. and Baek et al. respectively propose an ID-based mediated encryption scheme based on the practical ID-based encryption scheme from bilinear pairing due to Bone...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید