作者: interlude 時(shí)間: 2025-3-21 21:10
Information Security978-3-030-30215-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: grandiose 時(shí)間: 2025-3-22 02:08 作者: 反抗者 時(shí)間: 2025-3-22 05:43
https://doi.org/10.1007/978-3-030-30215-3artificial intelligence; authentication; cryptographic protocols; data mining; data privacy; data securit作者: 革新 時(shí)間: 2025-3-22 09:43
Jingchun Yang,Meicheng Liu,Dongdai Link whose programmatic title points to the creation of shared value. However, their impact is due not to the scientific merit of their classic 2011 paper, which is indeed low, as many scholarly commentators have already pointed out. In my paper, I will explain the surprising discrepancy between impact作者: 遠(yuǎn)足 時(shí)間: 2025-3-22 13:38
iedman in the perspective of contemporary debates on legitimacy and good corporate citizenship. This is a development of the argument presented by Jacob Dahl Rendtorff concerning the liberal property rights paradigm of business ethics in his book . (Responsibility, ethics and legitimacy of corporati作者: 細(xì)胞 時(shí)間: 2025-3-22 19:55
Iraklis Leontiadis,Reza Curtmolastion whether business is creating value for the many or just for a few. At the same time there is an expectation that business contributes to solutions to huge challenges such as poverty or climate change. In such an environment, the concept of Shared Value is catching a lot of attention from acade作者: 災(zāi)難 時(shí)間: 2025-3-22 21:29 作者: Chipmunk 時(shí)間: 2025-3-23 02:36 作者: 喧鬧 時(shí)間: 2025-3-23 05:32 作者: STANT 時(shí)間: 2025-3-23 11:28
Apostolis Zarras,Ilias Gerostathopoulos,Daniel Méndez Fernándezd interdisciplinary reading of participatory visual methods (PVMs) might look like for researchers and practitioners. Grounding my analysis in the use of photo-based methods? I invite researchers and practitioners to challenge our assumptions about the inherent potential of PVMs, by intervening in c作者: 裂隙 時(shí)間: 2025-3-23 17:26
Maksim Tsikhanovich,Malik Magdon-Ismail,Muhammad Ishaq,Vassilis Zikasd interdisciplinary reading of participatory visual methods (PVMs) might look like for researchers and practitioners. Grounding my analysis in the use of photo-based methods? I invite researchers and practitioners to challenge our assumptions about the inherent potential of PVMs, by intervening in c作者: Banquet 時(shí)間: 2025-3-23 19:34 作者: Traumatic-Grief 時(shí)間: 2025-3-24 01:41 作者: 不溶解 時(shí)間: 2025-3-24 06:20
grant or minority groups and the host citizens—social cohesion has become a major topic. However, there is no universal definition of social cohesion (Demireva, 2015; Markus, 2010), though there have been some common understandings of the concept. In addition, this concept is also found in the elabo作者: 結(jié)合 時(shí)間: 2025-3-24 10:25 作者: prosthesis 時(shí)間: 2025-3-24 14:07
Arash Alavi,Rajiv Gupta,Zhiyun Qianf the internationalization of higher education is “the process of integrating an international, intercultural, or global dimension into the purpose, functions, or delivery” of higher education (Knight, 2002: 2). De Wit (2002) identified 19 rationales for the internationalization of higher education 作者: colloquial 時(shí)間: 2025-3-24 18:11
Evangelia Anna Markatou,Roberto Tamassiaf the internationalization of higher education is “the process of integrating an international, intercultural, or global dimension into the purpose, functions, or delivery” of higher education (Knight, 2002: 2). De Wit (2002) identified 19 rationales for the internationalization of higher education 作者: 使出神 時(shí)間: 2025-3-24 21:06 作者: 偏離 時(shí)間: 2025-3-25 03:08 作者: MOT 時(shí)間: 2025-3-25 06:35
IBWH: An Intermittent Block Withholding Attack with Optimal Mining Reward Rate these systems. Such pools can misbehave by strategically withhold found solutions (i.e., blocks). It has been shown that the reward of a large malicious mining pool can be significantly increased by deviating from the honest mining strategy. Moreover, a malicious pool can launch the block withholdi作者: finite 時(shí)間: 2025-3-25 07:57
Full Database Reconstruction with Access and Search Pattern Leakage servers. In order to protect the confidentiality of data in the cloud, a database can be stored in encrypted form and all queries can be executed on the encrypted database. Recent research results suggest that a curious cloud provider may be able to decrypt some of the items in the database after s作者: 發(fā)牢騷 時(shí)間: 2025-3-25 12:12 作者: coagulate 時(shí)間: 2025-3-25 16:38 作者: evasive 時(shí)間: 2025-3-25 23:25 作者: Intend 時(shí)間: 2025-3-26 03:20 作者: JOG 時(shí)間: 2025-3-26 04:26
Can Today’s Machine Learning Pass Image-Based Turing Tests?dvancements in computational infrastructures. One prominent example application of ML is given by image recognition services that allow to recognize characteristics in images and classify them accordingly. One question that arises, also in light of current debates that are fueled with emotions rathe作者: 慷慨不好 時(shí)間: 2025-3-26 10:30 作者: 馬賽克 時(shí)間: 2025-3-26 15:11
Code-Based Zero Knowledge PRF Argumentsrving identification. Libert . (ASIACRYPT 2017) has investigated the problem of proving the correct evaluation of lattice-based PRFs based on the . (LWR) problem. In this paper, we go beyond lattice-based assumptions and investigate, whether we can solve the question of proving the correct evaluatio作者: daredevil 時(shí)間: 2025-3-26 18:01 作者: 法官 時(shí)間: 2025-3-26 21:22
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries persistent passive adversary model. These attacks allow an (honest but curious) adversary (such as the cloud provider) to find the order of the elements in the database and, in some cases, to even . the database itself..In this paper we present two mitigation techniques to make it harder for the ad作者: 兇殘 時(shí)間: 2025-3-27 03:16 作者: 粗糙 時(shí)間: 2025-3-27 07:42
PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptographylex learning algorithms in a heavy multi-party computation (MPC) framework..We showcase our algorithms’ utility and privacy for NMF on topic modeling and recommender systems, and for SVD on principal component regression, and low rank approximation.作者: 性學(xué)院 時(shí)間: 2025-3-27 11:25
Code-Based Zero Knowledge PRF Argumentsl for the correct evaluation of a code-based PRF, which allows a prover to convince a verifier that a given output . is indeed computed from the code-based PRF with a secret key . on an input ., . .. Finally, we analytically evaluate the protocol’s communication costs.作者: Stagger 時(shí)間: 2025-3-27 14:05
Getting Under Alexa’s Umbrella: Infiltration Attacks Against Internet Top Domain Listsat least one year. We find that even those domains contain entries labelled as malicious. Our results suggest that researchers should refrain from using these domain rankings to model benign behaviour.作者: 華而不實(shí) 時(shí)間: 2025-3-27 18:10
Conference proceedings 2019al sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; ?Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels;? Malware Analysis; Crypto III: Signatures and Authentication..作者: 一加就噴出 時(shí)間: 2025-3-28 00:44
0302-9743 d in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; ?Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels;? Malware Analysis; Crypto III: Signatures and Authentication..978-3-030-30214-6978-3-030-30215-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 立即 時(shí)間: 2025-3-28 03:29
0302-9743 A, in September 2019. ..The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; ?Crypto II: Zero-Know作者: 使糾纏 時(shí)間: 2025-3-28 09:41
Conference proceedings 2019ember 2019. ..The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; ?Crypto II: Zero-Knowledge Proo作者: 噴出 時(shí)間: 2025-3-28 11:24 作者: Ornithologist 時(shí)間: 2025-3-28 15:48
al responsibility, Harvard University Press, Cambridge, MA, 2003) which became Strategic Corporate Social Responsibility (Harv Bus Rev 84(12):78–92, 2006) and gradually developed into the concept of Creating Shared Value (Harv Bus Rev 89(1):62–77, 2011). We see how Michael Porter integrates the crit作者: CROAK 時(shí)間: 2025-3-28 20:04
Iraklis Leontiadis,Reza Curtmola turn claim that business has to maximize profits or respectively has to create value for the shareholders first and foremost. This situation analysis raises some important questions that this article tries to explore: How could it happen in the first place that business is under such scrutiny, give作者: 自由職業(yè)者 時(shí)間: 2025-3-28 23:34
Chloé Hébant,Duong Hieu Phan,David Pointchevalotography and the ‘truth effect’; photography, representation and visual literacies; and the rhetoric of participation. I conclude by reflecting on the implications of these critiques for PVMs more broadly, so that we can engage in a more nuanced discussion about the methodological opportunities . t作者: 值得 時(shí)間: 2025-3-29 05:08 作者: 粘土 時(shí)間: 2025-3-29 07:21
otography and the ‘truth effect’; photography, representation and visual literacies; and the rhetoric of participation. I conclude by reflecting on the implications of these critiques for PVMs more broadly, so that we can engage in a more nuanced discussion about the methodological opportunities . t作者: 沒(méi)收 時(shí)間: 2025-3-29 13:27
Apostolis Zarras,Ilias Gerostathopoulos,Daniel Méndez Fernándezotography and the ‘truth effect’; photography, representation and visual literacies; and the rhetoric of participation. I conclude by reflecting on the implications of these critiques for PVMs more broadly, so that we can engage in a more nuanced discussion about the methodological opportunities . t作者: 下垂 時(shí)間: 2025-3-29 16:46
Maksim Tsikhanovich,Malik Magdon-Ismail,Muhammad Ishaq,Vassilis Zikasotography and the ‘truth effect’; photography, representation and visual literacies; and the rhetoric of participation. I conclude by reflecting on the implications of these critiques for PVMs more broadly, so that we can engage in a more nuanced discussion about the methodological opportunities . t作者: 殖民地 時(shí)間: 2025-3-29 22:59
otography and the ‘truth effect’; photography, representation and visual literacies; and the rhetoric of participation. I conclude by reflecting on the implications of these critiques for PVMs more broadly, so that we can engage in a more nuanced discussion about the methodological opportunities . t作者: reperfusion 時(shí)間: 2025-3-30 01:04 作者: Confirm 時(shí)間: 2025-3-30 04:05
to focus upon three common elements: “shared vision,” “a property of a group or community,” and “a process” (Markus, 2010: 8). Extensive surveys of social cohesion have helped define the national character of some societies, and will often include a nation’s attitudes toward newcomers who arrive via作者: 初學(xué)者 時(shí)間: 2025-3-30 09:56
l economy at both the national and international levels. Specifically, the internationalization of higher education in Japan has been perceived as a response from the educational sector to market-led globalization (Hashimoto, 2005; Kudo et al., 2014).