|
|
|
Qingnan Chen, Ting Wu, Chengnan Hu, Anbang Chen and Qiuhua Zheng
Cross-domain authenticated asymmetric group key agreement allows group members in different domains to establish a secure group communication channel and the senders can be anyone. However, the existing schemes do not meet the requirement of batch verifi...
ver más
|
|
|
|
|
|
|
Zhihao Wang, Ru Huo and Shuo Wang
In smart grids, the access verification of a large number of intelligent gateways and terminal devices has become one of the main concerns to ensure system security. This means that smart grids need a new key management method that is safe and efficient ...
ver más
|
|
|
|
|
|
|
Mariano Basile, Gianluca Dini, Filippo Vernia and Luigi Lamoglie
Any commercial and industrial application employing smart string inverters whereby (unsecure) group communication is implemented according to a multicast fashion over UDP/IP.
|
|
|
|
|
|
|
Matthias Carlier, Kris Steenhaut and An Braeken
This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are establish...
ver más
|
|
|
|
|
|
|
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono
Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an...
ver más
|
|
|
|
|
|
|
The purpose of this study is to identify the characteristics of freight mode choices made by shippers and carriers with the introduction of a new freight transport system. We set an area in which actual freight transport takes place as the analysis scope...
ver más
|
|
|
|
|
|
|
Burgert A. Senekal,Karlien Stemmet
AbstractBackground: Company director networks have been studied for many countries, including South Africa, from the perspective of network theory. However, most studies of company director networks focus on the overall structure of the network, tha...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang and Chun-I Fan
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum a...
ver más
|
|
|
|
|
|
|
Johan Strydom
The aim of the paper is to determine empirically through quantitative research the key characteristics for survival of formal small businesses in the Soweto Township area. The focus was on the formal small businesses that have been operating in a very dy...
ver más
|
|
|
|
|
|
|
Frank DK Fugar, Adwoa B Agyakwah-Baah
Pág. 103 - 116
This study investigates the causes of delay of building construction projects in Ghana to determine the most important according to the key project participants; clients, consultants, and contractors. Thirty-two possible causes of delay were identified f...
ver más
|
|
|
|
|
|
|
Frank DK Fugar, Adwoa B Agyakwah-Baah
Pág. 103 - 116
This study investigates the causes of delay of building construction projects in Ghana to determine the most important according to the key project participants; clients, consultants, and contractors. Thirty-two possible causes of delay were identified f...
ver más
|
|
|
|
|
|
|
Adam R. Szromek, Bartlomiej Walas and Zygmunt Kruczek
The tendency of enterprises to use open innovations can be seen in the literature in many areas of research and practical application. However, the use of the concept of open innovation in local administration entities is less noticeable. The research ga...
ver más
|
|
|
|
|
|
|
Erkan BIL, Tanju GÜDÜK, Gülay KESKIN
Pág. 127 - 140
Through globalization, countries aim to have a competitive advantage about trading and increasing financial opportunities in the global market with international collaboration and economic integration. In recent years, the emerging and exp...
ver más
|
|
|
|
|
|
|
Eustace Njagi Kithumbu, Julius M Huho, Humphrey Opiyo Omondi
Pág. 34 - 47
The group ranch system is one of the best land ownership and livestock production strategies in the dry lands of the world where the potential for rain-fed agriculture is limited. This has resulted in numerous studies on the establishment of group ranche...
ver más
|
|
|
|
|
|
|
Eustace Njagi Kithumbu, Julius M. Huho, Humphrey Omondi
Pág. 24 - 34
The group ranch system is one of the best land ownership and livestock production strategies in the dry lands of the world where the potential for rain-fed agriculture is limited. Its sustainability relies greately on choice of sustainability strategies ...
ver más
|
|
|
|
|
|
|
Fenli Min, Jincheng Zuo, Yi Zhang, Qingwei Lin, Biyun Liu, Jian Sun, Lei Zeng, Feng He and Zhenbin Wu
Increasing N concentration and the high density of epiphytic algae are both key factors leading to the decline of submerged macrophytes in many eutrophic lakes. In order to investigate the impacts of increased nitrate-N concentration and the growth of ep...
ver más
|
|
|
|
|
|
|
Chong Mahn Ling,Yuen Yee Yen,Wendy Teoh Ming Yen
Pág. 132 - 137
Effective cross-border knowledge transfer can help to improve the competitiveness of the multinational companies, improve production process or product development, lower the operation cost, reduce errors, and improve profitability. However, cross-border...
ver más
|
|
|
|
|
|
|
Sasawat Malaivongs, Supaporn Kiattisin and Pattanaporn Chatjuthamard
Cybersecurity risk is among the top risks that every organization must consider and manage, especially during this time wherein technology has become an integral part of our lives; however, there is no efficient and simplified measurement method that org...
ver más
|
|
|
|