نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

2006
Xavier Boyen

The main purpose of this document is to provide simple and high-level, yet actionably, concrete, and standard descriptions of two practical instantiations of the Boneh-Boyen BB1 identity-based cryptosystem. One instantiation is an full encryption (or IBE) system, the other a key encapsulation mechanism (or IBKEM). A secondary purpose of the document is to discuss the many extensions of practica...

Background & Aims: Historic bazaars are the dynamic hotspot of cities, have special social, economic and physical structures, and give identity due to their semantic characteristics; these points help in forming the place attachment. Tabriz Bazaar with its unique characteristics derived from the semantic and artistic The present study is aimed at determining the place identity components and ...

2017
Monika Ravik Anton Havnes Ida Torunn Bjørk

Learning practical nursing skills is an important part of the baccalaureate in nursing. However, many newly qualified nurses lack practical skill proficiency required to ensure safe patient care. The invasive skill peripheral vein cannulation (PVC) is particularly challenging to learn and perform. This study explored conditions influencing nursing students' learning and performance of the techn...

1999
Anna Lysyanskaya Ronald L. Rivest Amit Sahai Stefan Wolf

Pseudonym systems allow users to interact with multiple orga nizations anonymously using pseudonyms The pseudonyms cannot be linked but are formed in such a way that a user can prove to one organization a statement about his relationship with another Such a statement is called a credential Previous work in this area did not protect the system against dis honest users who collectively use their ...

1999
Anna Lysyanskaya Ronald L. Rivest Amit Sahai Stefan Wolf

Pseudonym systems allow users to interact with multiple organizations anonymously, using pseudonyms. The pseudonyms cannot be linked, but are formed in such a way that a user can prove to one organization a statement about his relationship with another. Such a statement is called a credential. Previous work in this area did not protect the system against dishonest users who collectively use the...

2009
Gabriele Lenzini Marinella Petrocchi

In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure. This means that security of the shared resources is of prime importance. Frequent delegation of tasks among users must be anticipated as most nomadic environments are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not o...

2009
Naveed Ahmed Christian D. Jensen

In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure. This means that security of the shared resources is of prime importance. Frequent delegation of tasks among users must be anticipated as most nomadic environments are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not o...

2009
S. Sharmila Deva Selvi S. Sree Vivek C. Pandu Rangan

Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practical identity based signcryption schemes without bilinear pairing are considered to be almost impossible, it will be interesting to explore possibilities of constructing such systems in other settings like certificateless cryptog...

Journal: :Sports medicine 2015
Tim Rees S Alexander Haslam Pete Coffee David Lavallee

Drawing on social identity theory and self-categorization theory, we outline an approach to sport psychology that understands groups not simply as features of sporting contexts but rather as elements that can be, and often are, incorporated into a person's sense of self and, through this, become powerful determinants of their sport-related behavior. The underpinnings of this social identity app...

2009
Marion Schulze Mahmood H. Shah

Identity theft is the fastest growing crime in the 21 century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید