نتایج جستجو برای: identity construction
تعداد نتایج: 322851 فیلتر نتایج به سال:
The study is about the identity construction of Italian Extreme Right groups in different Computer Mediated Communication (CMC) environments. Rhetoric Psychology and Critical Discourse Analysis joint approaches are used to analyse two websites and two newsgroups of extreme right. The results confirm Billig’s hypothesis that such groups play a dual communication strategy in Computer Mediated Com...
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all identity-based. We use the security model of Bellare, Shi, and Zhang [3], except to add three identity managers for manager, members, and OA respectively, and we discard the Open Oracle (OO). Our construction uses identit...
The issues examined in this paper are located within the context of the debate in Social Identity Theory (SIT) about the motivational forces underlying identity formation. The starting point of the paper is SIT in the tradition of Tajfel and Turner (Tajfel & Turner, 1979; Tajfel 1981, Hogg & Abrams, 1988). According to SIT, people are motivated by a fundamental need for self-esteem in the proce...
Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes we...
We propose a hybrid (KEM/DEM) model for the recently proposed primitive of identity-based encryption with wildcards (WIBE), and confirm that the hybrid construction is secure. We also propose new chosenciphertext secure WIBE schemes that have somewhat more efficient security reductions and some performance benefits. Our first construction is a generic one from any one-way secure WIBE in the ran...
Abstract. In this paper, we prove a new identity for values of the Hurwitz zeta function which contains as particular cases Koecher’s identity for odd zeta values, the Bailey-Borwein-Bradley identity for even zeta values and many other interesting formulas related to values of the Hurwitz zeta function. We also get an extension of the bivariate identity of Cohen to values of the Hurwitz zeta fu...
A number of Privacy Enhancing Technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who ...
“Identity here and there. Migration as resource for identity construction”, by Alexandra Deliu, discusses building in the context of Romanian international migration, using narrative analysis its main analytical approach. The author describes a comprehensive picture how migration experience is employed conjunction with other discursive resources to account self others.
Nowadays Islamic countries more than ever concentrate on identity to revive their dignity at the age of globalization. Countries of west of Asia especially Persian Gulf countries enjoy a prosperous architectural era because of oil well revenues. Saudi Arabia from among them selected purposely to analyses to understand interaction of localization and globalization in contemporary architecture of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید