|
|
|
Jyotirmoy Das,Sangeeta Kakoty,Majidul Ahmed
Pág. 70 - 76
The access to digital data by the users has increased in recent times with the advent of data communication technologies and its popularization. The data which is in digital form has to pass through insecure channels, for example when a user accesses the...
ver más
|
|
|
|
|
|
|
Ou Ruan, Changwang Yan, Jing Zhou and Chaohao Ai
Multiparty Private Set Intersection (MPSI) is dedicated to finding the intersection of datasets of multiple participants without disclosing any other information. Although many MPSI protocols have been presented, there are still some important practical ...
ver más
|
|
|
|
|
|
|
Yi-Fan Tseng, Zi-Yuan Liu and Raylin Tso
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors satis...
ver más
|
|
|
|
|
|
|
Hyundo Yoon, Soojung Moon, Youngki Kim, Changhee Hahn, Wonjun Lee and Junbeom Hur
Public key encryption with keyword search (PEKS) enables users to search over encrypted data outsourced to an untrusted server. Unfortunately, updates to the outsourced data may incur information leakage by exploiting the previously submitted queries. Pr...
ver más
|
|
|
|
|
|
|
Nor Suzila Lop,Kharizam Ismail,Haryati Mohd Isa
Pág. 95 - 104
In Private Finance Initiative (PFI), payment for services is based on pre-determined standards and performance. Thus, Key Performance Indicators (KPIs) have been used to measure this performance. However, lack of an effective KPIs was identified as a cor...
ver más
|
|
|
|
|
|
|
Shamsida Saidan Khaderi,Ani Saifuza Abd Shukor
Pág. 71 - 78
Private Finance Initiative (PFI) has been successfully implemented across the globe, however regarding the implementation process; the PFI arrangements are not similar from country to country. Based on the circumstances, this paper investigates the key i...
ver más
|
|
|
|
|
|
|
Mirjana Petkovic, Dubravka Djedovic?Nègre, Jelena Lukic
Pág. 1 - 11
Public-Private Partnership (PPP), as a current topic in theory and practice, has mostly been treated from the perspective of legislation and recognized by classical macroeconomic paradigm. The aim of this paper is to open a new aspect of dealing with thi...
ver más
|
|
|
|
|
|
|
Oluwatobi Mary Owojori and Chioma Okoro
The United Nations (UN) 2030 Agenda, borne from the most inclusive policy dialogue ever, emphasized partnerships built upon collaboration to achieve sustainable goals, as documented in SDG17. However, the building and construction sector has been experie...
ver más
|
|
|
|
|
|
|
Balasundaram Nimalathasan
Pág. 9 - 17
|
|
|
|
|
|
|
Nata?a Golubovic,Srdan Golubovic
Pág. 183 - 198
Reconciling work and family life is one of the key elements of the quality of work and employment. The concept of work-life balance refers to the creation and maintenance of such work environment that allows employees to achieve a balance between work an...
ver más
|
|
|
|
|
|
|
Jacob Heller
Pág. 107 - 113
Based on a recent survey of public and private procurement professionals in the Southwest United States, this study reports perspectives on supply chain management and perceptions regarding job-related importance of key supply chain management elements b...
ver más
|
|
|
|
|
|
|
Jacob Heller
Pág. 107 - 113
Based on a recent survey of public and private procurement professionals in the Southwest United States, this study reports perspectives on supply chain management and perceptions regarding job-related importance of key supply chain management elements b...
ver más
|
|
|
|
|
|
|
Fadhillah Azmi,Winda Erika
Pág. 27 - 29
Komunikasi adalah proses dasar dari pertukaran informasi. Efektifitas komunikasikomputer secara umum adalah melalui internet atau beberapa saluran komunikasi lainnya.Tujuan utama tulisan ini adalah berdasarkan pada analisis hasil yang diberikan Weinermen...
ver más
|
|
|
|
|
|
|
Saykham Boutthavong, Kimihiko Hyakumura and Makoto Ehara
A key challenge for reducing emission from deforestation and forest degradation (REDD) in developing countries is to balance the power of various stakeholders in decision making. This study explores the forms of stakeholder participation in the implement...
ver más
|
|
|
|
|
|
|
Qihong Yu, Jiguo Li and Sai Ji
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si...
ver más
|
|
|
|
|
|
|
Yiping Yan, Matthew Burke, Abraham Leung, James McBroom
Pág. 567?585
School travel behaviors are associated with children?s health and well-being, traffic congestion, and sustainability. Australia has seen a steady rise in the number of car-passenger trips made by children to school, and a decline in walking-to-school. Au...
ver más
|
|
|
|
|
|
|
Yu-Jie (Jessica) Kuo and Jiann-Cherng Shieh
The advent and rapid rise of network technology and cloud computing have led to new opportunities for ushering in a new era in telehealth. Thanks to the Internet of Things (IoT) and advances in 5G communication, telehealth is expanding and shows no signs...
ver más
|
|
|
|
|
|
|
Sergey Alekseev
Pág. 38 - 43
The article is devoted to the investigation of the prospects of using innovative intelligent technologies in modern transport systems. Special attention is paid to the prospects of the development of transport infrastructure, in particular, the construct...
ver más
|
|
|
|
|
|
|
Ingrid Olesen, Hans B. Bentsen, Michael Phillips and Raul W. Ponzoni
The annual production from global aquaculture has increased rapidly from 2.6 million tons or 3.9% of the total supply of fish, shellfish and mollusks in 1970, to 66.7 million tons or 42.2% in 2012, while capture fisheries have more or less leveled out at...
ver más
|
|
|
|
|
|
|
Lucas Mayr, Lucas Palma, Gustavo Zambonin, Wellington Silvano and Ricardo Custódio
Private key management is a complex obstacle arising from the traditional public key infrastructure model. However, before any related security breach can be addressed, it must first be reliably detected. Certificate Transparency (CT) is an example of a ...
ver más
|
|
|
|