搜索结果: 1-15 共查到“Identity”相关记录99条 . 查询时间(0.068 秒)
The Governance of Identity. Recording Values of Rural Heritage in Urban Areas
Cultural heritage surveying farming inventory urban planning understanding decision support
2015/11/11
This paper describes the use of a prototype application to read the value of rural heritage inserted in urban sprawl. Until last decades, rural settlements, as a place of perpetual work-shop rooted to...
"Doing" Science Versus "Being" A Scientist:Examining 10/11-Year-Old Schoolchildren's Constructions Of Science Through The Lens Of Identity
Doing Science Versus Being A Scientist Schoolchildren's Constructions The Lens Of Identity
2015/11/9
"Doing" Science Versus "Being" A Scientist:Examining 10/11-Year-Old Schoolchildren's Constructions Of Science Through The Lens Of Identity.
Curriculum,Identity,and Experience in Multicultural Teacher Education
Curriculum Identity Experience Multicultural Teacher Education
2015/9/25
This article reports on the initial stages of an ongoing action research project in multicultural teacher education. Operating from a view of curriculum as the creation of culturally significant domai...
Bonding, Bridging, and Becoming a Teacher: Student Cohorts and Teacher Identity
Teacher Identity Student
2015/9/16
This research examines the effects of social capital on teacher identity in a sample of undergraduate after-degree education students who took most or all of their courses together as a cohort. A theo...
We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffi...
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. T...
Hierarchical Identity Based Encryption with Constant Size Ciphertext
Constant Size Ciphertext Based Encryption
2015/8/5
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and decryption requires only two bilinear map computations, independent of ...
Efficient Selective Identity-Based Encryption Without Random Oracles
Random Oracles Identity-Based Encryption
2015/8/5
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model Selective identity secure IBE is a slightly weaker security model ...
Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on the...
New Packaging for Left-Over Big Data: "Identity Proofing" and "Equality Monitoring"
Equality Monitoring Identity Proofing
2015/8/4
“Identity Proofing” is a commercial database search product recently adopted by the US Department of Homeland Security (DHS), other government agencies, and commercial entities, paradoxically, to veri...
The very same thing: Extending the object token concept to incorporate causal constraints on individual identity
Episodic memory Action planning Binding Force-motion analogy Medial temporal cortex Posterior parietal cortex
2015/7/21
The contributions of feature recognition, object categorization, and recollection of episodic memories to the re-identification of a perceived object as the very same thing encountered in a previous p...
Educating for Identity: Problematizing and Deconstructing Our Literacy Pasts
Problematizing Deconstructing
2015/7/3
In order to become effective teachers of language and literacy, it is critical for teacher
candidates to have a sense of who they are as literate beings, how their literacy pasts have been
lived, ...
Understanding Conflict in Geographically Distributed Teams: The Moderating Effects of Shared Identity, Shared Context, and Spontaneous Communication
Teams Understanding Confl ict
2015/7/3
Geographically distributed teams are increasingly prevalent in the workplace, and research on distributed teams is ever
more available. Despite this increased attention, we still know surprisingly li...