Academic literature on the topic 'Revocability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Revocability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Revocability"
Deutscher, Penelope. "Revocability, Exception, Disqualification." Critical Times 7, no. 1 (2024): 66–93. http://dx.doi.org/10.1215/26410478-11082967.
Full textTeng, Da, and Yanqing Yao. "Signer revocability for threshold ring signatures." Computer Standards & Interfaces 93 (April 2025): 103960. https://doi.org/10.1016/j.csi.2024.103960.
Full textLv, Xin, Zhijian Wang, Feng Qian, and Feng Xu. "Schnorr Ring Signature Scheme with Designated Revocability." Intelligent Automation & Soft Computing 18, no. 6 (2012): 739–49. http://dx.doi.org/10.1080/10798587.2012.10643284.
Full textWei, Jianghong, Xinyi Huang, Wenfen Liu, and Xuexian Hu. "Practical Attribute-based Signature: Traceability and Revocability." Computer Journal 59, no. 11 (2016): 1714–34. http://dx.doi.org/10.1093/comjnl/bxw045.
Full textVerbruggen, Aviel. "Revocability and reversibility in societal decision-making." Ecological Economics 85 (January 2013): 20–27. http://dx.doi.org/10.1016/j.ecolecon.2012.10.011.
Full textHan, Xu, Dawei Zhang, Zongmin Huang, Shuang Yao, and Zuodong Wu. "Revocable One-Time Ring Signature from Pairings." Wireless Communications and Mobile Computing 2022 (August 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/8021267.
Full textWANG, Lihua, Licheng WANG, Masahiro MAMBO, and Eiji OKAMOTO. "Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95-A, no. 1 (2012): 70–88. http://dx.doi.org/10.1587/transfun.e95.a.70.
Full textSeager, Thomas P., and Thomas L. Theis. "Exergetic pollution potential: Estimating the revocability of chemical pollution." Exergy, An International Journal 2, no. 4 (2002): 273–82. http://dx.doi.org/10.1016/s1164-0235(02)00066-3.
Full textSalman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.
Full textZhang, Jiawei, Jianfeng Ma, Teng Li, and Qi Jiang. "Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing." Security and Communication Networks 2021 (February 27, 2021): 1–17. http://dx.doi.org/10.1155/2021/6646445.
Full textDissertations / Theses on the topic "Revocability"
Thomas, Michael H. "Revocability in Decision Making: A Protocol For The Release of Nonindigenous Aquatic Species /." The Ohio State University, 1996. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487933245535759.
Full textKANADE, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-01057728.
Full textStagnara, Pierre. "La revocabilite des donations entre epoux." Lyon 3, 1987. http://www.theses.fr/1987LYO33006.
Full textKanade, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Thesis, Evry, Institut national des télécommunications, 2010. http://www.theses.fr/2010TELE0022/document.
Full textMahamdi, Célia. "Multi-Consensus distribué : agrégation et révocabilité." Electronic Thesis or Diss., Sorbonne université, 2024. http://www.theses.fr/2024SORUS426.
Full textSARACENI, BARBARA. "La revoca dell’amministratore di s.r.l. a confronto con l’ordinamento tedesco." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2011. http://hdl.handle.net/2108/202141.
Full textYu, Yao-chun, and 游曜駿. "An E-Cash Protocol with Efficient Double-Spending Revocability." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/nbeud8.
Full textBooks on the topic "Revocability"
Yamashita, Yoshikazu. Formation of Contract in Japan. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198808114.003.0012.
Full textBook chapters on the topic "Revocability"
Wang, Lihua, Licheng Wang, Masahiro Mambo, and Eiji Okamoto. "Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities." In Information and Communications Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17650-0_27.
Full textM'RaÏhi, David, and David Pointcheval. "Distributed Trustees and revocability: A framework for internet payment." In Financial Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055471.
Full textAnada, Hiroaki, and Yoshifumi Ueshige. "Generic Construction of Anonymous Deniable Predicate Authentication Scheme with Revocability." In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41025-4_10.
Full textLei, Jing, Qingqi Pei, Xuefeng Liu, and Wenhai Sun. "A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05063-4_16.
Full textGuo, Lifeng, Xueke Ma, and Wei-Chuen Yau. "Online/Offline and Fine-Grained Controllable Editing with Accountability and Revocability in Blockchains." In Communications in Computer and Information Science. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-3203-6_7.
Full textDuan, Shuhong, Zhenhua Liu, and Peilin Zhou. "A privacy-preserving personal health record with searchability and revocability using attribute-based encryption." In Advances on Broad-Band Wireless Computing, Communication and Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49106-6_85.
Full textXu, Shengmin, Yinghui Zhang, Yingjiu Li, Ximeng Liu, and Guomin Yang. "Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37231-6_10.
Full text"revocability, n." In Oxford English Dictionary, 3rd ed. Oxford University Press, 2023. http://dx.doi.org/10.1093/oed/7177522431.
Full textSchwenzer, Ingeborg, and Ulrich G. Schroeter. "Revocability of offer." In Schlechtriem & Schwenzer: Commentary on the UN Convention on the International Sale of Goods (CISG), 5th ed. Oxford University Press, 2022. http://dx.doi.org/10.1093/law/9780198868675.003.0021.
Full textBraun, Alexandra. "Revocability of Mutual Wills." In Exploring the Law of SuccessionStudies National, Historical and Comparative. Edinburgh University Press, 2007. http://dx.doi.org/10.3366/edinburgh/9780748632909.003.0022.
Full textConference papers on the topic "Revocability"
Alessio, Davide. "A privacy-preserving broadcast encryption scheme with revocability." In 2011 IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2011. http://dx.doi.org/10.1109/ccnc.2011.5766481.
Full textZhang, Yang. "An Efficient Anonymous Authentication Protocol with Pseudonym Revocability." In 2009 Fifth International Joint Conference on INC, IMS and IDC. IEEE, 2009. http://dx.doi.org/10.1109/ncm.2009.214.
Full textIslam, Tasmina, and Michael Fairhurst. "Natural Revocability in Handwritten Signatures to Enhance Biometric Security." In 2012 International Conference on Frontiers in Handwriting Recognition (ICFHR). IEEE, 2012. http://dx.doi.org/10.1109/icfhr.2012.240.
Full textSanchez, Edwin Antonio, Anthony Weyer, Joseph Palackal, Kai Wang, Tyler Phillips, and Xukai Zou. "Advancing Active Authentication for User Privacy and Revocability with BioCapsules." In MobiHoc '23: Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. ACM, 2023. http://dx.doi.org/10.1145/3565287.3617624.
Full textWang, Ye, Shantanu Rane, Stark C. Draper, and Prakash Ishwar. "An information-theoretic analysis of revocability and reusability in secure biometrics." In 2011 Information Theory and Applications Workshop (ITA). IEEE, 2011. http://dx.doi.org/10.1109/ita.2011.5743600.
Full textYang, Changsong, Ping Li, Yong Ding, Xiaoling Tao, Huiyong Wang, and Ruwen Zhao. "A new SM2-based ring signature scheme with revocability and anonymity." In 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2024. http://dx.doi.org/10.1109/cscwd61410.2024.10580227.
Full textKalgi, Vishnu, Priyanka Parimi, and Rashmi Ranjan Rout. "Bilateral Access Control with Traceability and Revocability in Secure Cloud-Fog Computing Framework." In 2021 IEEE 18th India Council International Conference (INDICON). IEEE, 2021. http://dx.doi.org/10.1109/indicon52576.2021.9691685.
Full textWang, Chenguang, and Huiyan Chen. "Efficient Equality Test Technique using Identity-Based Encryption for Telemedicine Systems." In 10th International Conference on Software Engineering. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.140707.
Full textIslam, Tasmina, and Michael Fairhurst. "Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature Biometric." In 2019 Eighth International Conference on Emerging Security Technologies (EST). IEEE, 2019. http://dx.doi.org/10.1109/est.2019.8806234.
Full text