نتایج جستجو برای: practical identity
تعداد نتایج: 347233 فیلتر نتایج به سال:
The work of science teachers can be viewed from a variety of perspectives. In this article, teaching is seen as an activity in which teachers deliberate in the practical domain to decide on actions and goals. In the first part of the article, it is argued that, because practical reasoning is similar to scientific reasoning, a model of practical conceptual change can be developed that is analogo...
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme
Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identity based encryption and GDH signature scheme. In this paper we propose a mediated identity based signature(mIBS) scheme which applies the SEM architecture to an identity based signature. The use of a SEM offers a number of practical advantage...
We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosen-ciphertext (CCA2) attacks. Since our construction is direct and not based on hierarchical identity-based encryption, it is more efficient than all previously proposed schemes. Furthermore, we give the first chosen-ciphertext secure identity-based key encapsulation mecha...
This study investigated associations between ego strengths (psychosocial development), racial/ethnic identity using Multi-Ethnic Identity Measure-Revised (exploration, commitment) and Multidimensional Measure of Racial Identity (centrality, private regard, public regard) dimensions, and personal adjustment/well-being among 178 North American Indian/First Nations adolescents who resided and atte...
Identity relations are at the foundation of the Linked Open Data initiative and on the Semantic Web in general. They allow the interlinking of alternative descriptions of the same thing. However, many practical uses of owl:sameAs are known to violate its formal semantics. We propose a method that assigns meaning to (the subrelations of) an identity relation using the predicates of the dataset s...
Interactive conversation agents or CAs are computer programs or application software designed to simulate conversation with one or more human users in natural language. Providing CAs with knowledge, intelligence and humanoid interface has allowed them to be used in several practical applications. This paper presented the development and its performance of the interactive CAs called Artificial I...
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identity-corroborating information. It is exacerbated by the availability of personal information on the Internet. Published research proposing technical solutions is sparse. In this paper, we identify some underlying problems facilitating identity theft. To address the proble...
In this paper we explore the interplay between organisational identity and information systems (IS). More specifically, we examine how the appropriation of new IS may influence established patterns of identity enactment and inter-organisational practices. We report on findings from three in-depth case studies that depict the adoption and use of a new collaborative 3D modelling technology by a m...
Two studies examined whether chronic and situational expectations about being stigmatized predict attention toward cues that are threatening to social identity. In Study 1, women's chronic expectations about experiencing sexism were positively associated with their attention toward subliminal cues threatening to their social identity. In Study 2, women were vigilant toward subliminal cues threa...
Identity relations are at the foundation of the Semantic Web and the Linked Data Cloud. In many instances the classical interpretation of identity is too strong for practical purposes. This is particularly the case when two entities are considered the same in some but not all contexts. Unfortunately, modeling the specific contexts in which an identity relation holds is cumbersome and, due to ar...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید