نتایج جستجو برای: identity construction

تعداد نتایج: 322851  

2006
Dan Boneh Xavier Boyen Shai Halevi

We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our construction uses the recent identity based encryption system of Boneh and Boyen and the chosen ciphertext secure construction of Canetti, Halevi, and Katz.

سعادت جو, پریا, مهدوی نژاد, محمدجواد,

Nowadays Islamic countries more than ever concentrate on identity to revive their dignity at the age of globalization. Countries of west of Asia especially Persian Gulf countries enjoy a prosperous architectural era because of oil well revenues. Saudi Arabia from among them selected purposely to analyses to understand interaction of localization and globalization in contemporary architecture of...

2005
Samantha Schulz

Over the past two decades in Australia, the field of gifted education has expanded considerably. The term ‘giftedness’ has effectively entered mainstream discourse. The field of gifted education, which nowadays operates as a compensatory function of mass education, is comprised of groups of people who broadly share in the concept of giftedness but contest, through discourse, its meanings and pr...

2013
Jörg Peters

Geometric modelers typically define surfaces as images of closed polygonal regions under polynomial or rational maps, called patches. The images, also called patches, do not overlap but join along curves in lR . Differential topologists define surfaces as domains of invertible maps, also called patches, from lR to open sets in lR . The patches cover the surface by overlapping in open subsets. T...

Journal: :Computers in Human Behavior 2008
Shanyang Zhao Sherri Grasmuck Jason Martin

Early research on online self-presentation mostly focused on identity constructions in anonymous online environments. Such studies found that individuals tended to engage in role-play games and anti-normative behaviors in the online world. More recent studies have examined identity performance in less anonymous online settings such as Internet dating sites and reported different findings. The p...

Journal: :Psychological inquiry 2011
Lisa Feldman Barrett

This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, redistribution , reselling , loan, sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date...

2011

What people are, to themselves and others, is a product of a lifetime of interpersonal interactions superimposed over a very general ethological endowment (Harré, & van Langenhove, 1999). According to Eckert (2000) an individual is a linguistic agent building social meaning in their mutually-engaged community. Individual identity is constructed with group identities, and engagement in the world...

Journal: :Int. J. Found. Comput. Sci. 2014
Jia Fan Yuliang Zheng Xiaohu Tang

The concept of signcryption, introduced to the public by Zheng [19], is a primitive that combines the functions of both digital signature and public key encryption. The efficiency of signcryption is higher than sequential composition of digital signature and public key encryption. Identity-based signcryption is a specific type of signcryption, in which each user’s public key can be a string ide...

Journal: :Journal of Research and Practice in Information Technology 2008
Jian Weng Shengli Liu Kefei Chen Xiangxue Li

To minimize the damage caused by key-exposure in ID-based signatures, in ISPEC’06 Zhou et al (2006) proposed an ID-based key-insulated signature (IBKIS) scheme. However, their scheme is not strong key-insulated, i.e, if a user’s helper is compromised, the adversary can derive all of this user’s secret keys for any time period. Moreover, in practice, to alleviate the damage in case of key-exposu...

Journal: :IACR Cryptology ePrint Archive 2013
Jae Hong Seo Keita Emura

In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryption (IBE) with efficient revocation, which we call revocable IBE (RIBE). One of the significant benefit of their construction is scalability, where the overhead of the trusted authority is logarithmically increased in the number of users, whereas that in the Boneh-Franklin naive revocation way is lin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید