نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

Journal: :Journal of youth and adolescence 2011
Seth J Schwartz Wim Beyers Koen Luyckx Bart Soenens Byron L Zamboanga Larry F Forthun Sam A Hardy Alexander T Vazsonyi Lindsay S Ham Su Yeong Kim Susan Krauss Whitbourne Alan S Waterman

Identity is a critical developmental task during the transition to adulthood in Western societies. The purpose of the present study was to evaluate an empirically based, cluster-analytic identity status model, to examine whether all four of Marcia's identity statuses (diffusion, foreclosure, moratorium, and achievement) would emerge empirically, and to identify different patterns of identity fo...

2010
Seth J. Schwartz Koen Luyckx Wim Beyers Bart Soenens Byron L. Zamboanga Larry F. Forthun Sam A. Hardy Alexander T. Vazsonyi Lindsay S. Ham Yeong Kim Susan Krauss Alan S. Waterman

Identity is a critical developmental task during the transition to adulthood in Western societies. The purpose of the present study was to evaluate an empirically based, cluster-analytic identity status model, to examine whether all four of Marcia’s identity statuses (diffusion, foreclosure, moratorium, and achievement) would emerge empirically, and to identify different patterns of identity fo...

Journal: :IACR Cryptology ePrint Archive 2010
Debiao He Jianhua Chen Jin Hu

Many identity-based digital signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, we propose an identity based signature scheme without bilinear pairings. With both the run...

Journal: :JCP 2013
Geng Zhao Xufei Li

Although in theory, the speaker verification accuracy will not decrease with the number of users increasing, in fact, is not the case. In view of this situation, this paper expands the identity authentication scheme based on speaker recognition which is safe but deficient. After expansion, the identity authentication scheme based on speaker verification is more effective and practical.

Journal: :Mathematical Social Sciences 2014
Pritha Dev

This paper looks at the role of identity in the fragmentation of networks by incorporating the choice of commitment to identity characteristics, into a noncooperative network formation game. The Nash network will feature divisions based on identity, moreover, it will have layers of such divisions. Using the refinement of strictness, I get stars of highly committed players linked together by les...

2017
Shufen Niu Ling Niu Xiyan Yang Caifen Wang Xiangdong Jia

To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a sender in an identity-based cryptography system to send multi-message to multi-receiver in a certificateless cryptography system with different master keys. At the same time, all users are mapped to a distinct pseudo-identity for conditional ...

Journal: :Nursing leadership 2010
Nancy Cooper

In 2008, the Ontario Long Term Care Association was awarded funding from HealthForceOntario to assist with its nursing recruitment strategy based on research it had initiated in 2007. The research goal was to understand the career motivations and perceptions of students enrolled in registered nursing (RN) and registered practical nursing (RPN) programs in Ontario to develop and test a message t...

Mohammad Ali Torabi

In a speech community, people utilize their communicative competence which they have acquired from their society as part of their distinctive sociolinguistic identity. They negotiate and share meanings, because they have commonsense knowledge about the world, and have universal practical reasoning. Their commonsense knowledge is embodied in their language. Thus, not only does social life depend...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید