نتایج جستجو برای: practical identity
تعداد نتایج: 347233 فیلتر نتایج به سال:
Identity is a critical developmental task during the transition to adulthood in Western societies. The purpose of the present study was to evaluate an empirically based, cluster-analytic identity status model, to examine whether all four of Marcia's identity statuses (diffusion, foreclosure, moratorium, and achievement) would emerge empirically, and to identify different patterns of identity fo...
Identity is a critical developmental task during the transition to adulthood in Western societies. The purpose of the present study was to evaluate an empirically based, cluster-analytic identity status model, to examine whether all four of Marcia’s identity statuses (diffusion, foreclosure, moratorium, and achievement) would emerge empirically, and to identify different patterns of identity fo...
Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, we propose an identity based signature scheme without bilinear pairings. With both the run...
Although in theory, the speaker verification accuracy will not decrease with the number of users increasing, in fact, is not the case. In view of this situation, this paper expands the identity authentication scheme based on speaker recognition which is safe but deficient. After expansion, the identity authentication scheme based on speaker verification is more effective and practical.
This paper looks at the role of identity in the fragmentation of networks by incorporating the choice of commitment to identity characteristics, into a noncooperative network formation game. The Nash network will feature divisions based on identity, moreover, it will have layers of such divisions. Using the refinement of strictness, I get stars of highly committed players linked together by les...
To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a certificateless cryptography system with different master keys. At the same time, all users are mapped to a distinct pseudo-identity for conditional ...
In 2008, the Ontario Long Term Care Association was awarded funding from HealthForceOntario to assist with its nursing recruitment strategy based on research it had initiated in 2007. The research goal was to understand the career motivations and perceptions of students enrolled in registered nursing (RN) and registered practical nursing (RPN) programs in Ontario to develop and test a message t...
In a speech community, people utilize their communicative competence which they have acquired from their society as part of their distinctive sociolinguistic identity. They negotiate and share meanings, because they have commonsense knowledge about the world, and have universal practical reasoning. Their commonsense knowledge is embodied in their language. Thus, not only does social life depend...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید