نتایج جستجو برای: practical identity
تعداد نتایج: 347233 فیلتر نتایج به سال:
In the mid-1990s HIV/AIDS transitioned from a terminal illness to a chronic disease because of medical advances. In this qualitative study the author examines how people incorporate the HIV/AIDS identity into their selves at three points in time. Findings demonstrate a five-component process, including diagnosis, postdiagnosis turning point, immersion, post-immersion turning point, and integrat...
This demonstration will present recently completed research for a practice based PhD that explores the psycho-topographical relationship between bodies of matter, embodied data and data bodies, presenting a contribution to the field of mixed reality art, with a particular focus on post-biological identity. It will consist of the presentation of a body of practical outcomes that aim to provide a...
The aim of this paper is to present a signature scheme in which the ability to sign messages of a signer is limited to a fixed number k of signatures. It is an identity-based signature schemein which each signature can be usedonly once. We called suchschemes “bounded life-span”. It is based on mental games and it uses zero-knowledge tools. A validation center is needed to initialize this identi...
Email phishing attacks are one of today’s most common and costly forms of digital identity theft, where an adversary tricks a user into revealing their personal information by impersonating an established company. Such attacks could be mitigated with digitally-signed emails, if these signatures did not: (1) destroy the traditional repudiability of email, and (2) require the unrealistic, widespr...
AFRICAN DESCENT WOMEN’S CONCEPTUALIZATION OF ETHNIC/RACIAL AND GENDER IDENTITIES by Wendi S. Williams, MA This qualitative study explored racial/ethnic and gender identities of African descent women. Specifically, 13 African descent women were interviewed about influences on their racial/ethnic and gender identities, the process by such identities developed in order to assess the applicability ...
Password is the most commonly used authentication technique in smart card based authentication protocols. During communication, the static identity based authentication protocols leaks out the user’s authentication messages corresponding to static identity to the attacker. Therefore, the attacker can trace and identify the different requests belonging to the same user. On the other hand, the dy...
In 2014, Lin proposed an authentication system with dynamic identity of the user for low-power mobile devices using Chebyshev chaotic map. The scheme is proposed to provide mutual authentication and session key agreement between a remote server and its legitimate user. The scheme provides user anonymity and untracibility, and resilience from many cryptographic attacks. However, the author of th...
The aim of this paper is to examine the brand identity construction of user-generated brands (UGBs), using discursive and visual analysis of UGBs’ social media material in an attempt to contribute to a better understanding of this relatively new branding phenomenon. We specifically focused on two such brands: Airbnb and Couchsurfing. Our main findings reveal the emerged themes: the access to th...
Identifier-based Encryption (IBE) is an emerging cryptography schema. As it happens for new technologies, there are ongoing debates about its usefulness and best usage. This paper describes some practical applications of IBE, in the areas of confidentiality enforcement, privacy and identity management. These applications include: a service for timed release of confidential information; a secure...
Since 2002, several identity based signcryption schemes have been proposed. The purpose of designing a signcryption scheme is to perform signature and encryption both in one step but at lesser cost than performing signature and then encryption separately. In this paper, we present a literature survey on signcryption schemes for identity based setup. Our primary focus is on the schemes recently ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید