Journal articles on the topic 'Revocability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Revocability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Deutscher, Penelope. "Revocability, Exception, Disqualification." Critical Times 7, no. 1 (2024): 66–93. http://dx.doi.org/10.1215/26410478-11082967.
Full textTeng, Da, and Yanqing Yao. "Signer revocability for threshold ring signatures." Computer Standards & Interfaces 93 (April 2025): 103960. https://doi.org/10.1016/j.csi.2024.103960.
Full textLv, Xin, Zhijian Wang, Feng Qian, and Feng Xu. "Schnorr Ring Signature Scheme with Designated Revocability." Intelligent Automation & Soft Computing 18, no. 6 (2012): 739–49. http://dx.doi.org/10.1080/10798587.2012.10643284.
Full textWei, Jianghong, Xinyi Huang, Wenfen Liu, and Xuexian Hu. "Practical Attribute-based Signature: Traceability and Revocability." Computer Journal 59, no. 11 (2016): 1714–34. http://dx.doi.org/10.1093/comjnl/bxw045.
Full textVerbruggen, Aviel. "Revocability and reversibility in societal decision-making." Ecological Economics 85 (January 2013): 20–27. http://dx.doi.org/10.1016/j.ecolecon.2012.10.011.
Full textHan, Xu, Dawei Zhang, Zongmin Huang, Shuang Yao, and Zuodong Wu. "Revocable One-Time Ring Signature from Pairings." Wireless Communications and Mobile Computing 2022 (August 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/8021267.
Full textWANG, Lihua, Licheng WANG, Masahiro MAMBO, and Eiji OKAMOTO. "Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95-A, no. 1 (2012): 70–88. http://dx.doi.org/10.1587/transfun.e95.a.70.
Full textSeager, Thomas P., and Thomas L. Theis. "Exergetic pollution potential: Estimating the revocability of chemical pollution." Exergy, An International Journal 2, no. 4 (2002): 273–82. http://dx.doi.org/10.1016/s1164-0235(02)00066-3.
Full textSalman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.
Full textZhang, Jiawei, Jianfeng Ma, Teng Li, and Qi Jiang. "Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing." Security and Communication Networks 2021 (February 27, 2021): 1–17. http://dx.doi.org/10.1155/2021/6646445.
Full textSalman, Duha D., Raghad A. Azeez, and Adul mohssen J. Hossen. "Key Generation from Multibiometric System Using Meerkat Algorithm." Engineering and Technology Journal 38, no. 3B (2020): 115–27. http://dx.doi.org/10.30684/etj.v38i3b.652.
Full textZhao, Xinjian, Fei Xia, Hanning Xia, Yunlong Mao, and Shi Chen. "A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication." Electronics 13, no. 14 (2024): 2730. http://dx.doi.org/10.3390/electronics13142730.
Full textGiunchedi, Diletta. "Trust familiare, accordi di separazione e azione revocatoria (App. Firenze, 20 febbraio 2023)." Trusts, no. 6 (December 7, 2023): 1131–38. http://dx.doi.org/10.35948/1590-5586/2023.450.
Full textAkanbi, Mulikat B., Rasheed G. Jimoh, Agbotiname L. Imoize, Joseph B. Awotunde, ,. Olatunji S. Isiaka, and Shade B. Abdulrahaman. "Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics." Fusion: Practice and Applications 10, no. 2 (2023): 08–24. http://dx.doi.org/10.54216/fpa.100201.
Full textHan, Xu, and Dawei Zhang. "A Privacy-Preserving Reputation Evaluation System with Compressed Revocable One-Time Ring Signature (CRORS)." Mathematics 13, no. 1 (2024): 8. https://doi.org/10.3390/math13010008.
Full textYin, Wei, Qiaoyan Wen, Kaitai Liang, et al. "Delegation of Decryption Rights With Revocability From Learning With Errors." IEEE Access 6 (2018): 61163–75. http://dx.doi.org/10.1109/access.2018.2875069.
Full textZhang, Xinpeng, Chunxiang Xu, Xiaojun Zhang, Taizong Gu, Zhi Geng, and Guoping Liu. "Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability." Information 7, no. 2 (2016): 31. http://dx.doi.org/10.3390/info7020031.
Full textVidmar, Jure. "Unilateral Revocability in Wightman: Fixing Article 50 with Constitutional Tools." European Constitutional Law Review 15, no. 2 (2019): 359–75. http://dx.doi.org/10.1017/s1574019619000142.
Full textZhao, Dongdong, Shu Fang, Jianwen Xiang, Jing Tian, and Shengwu Xiong. "Iris Template Protection Based on Local Ranking." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4519548.
Full textLee, Sanghoon, and Ik Rae Jeong. "On the Unlinkability of Fingerprint Shell." Security and Communication Networks 2020 (March 4, 2020): 1–8. http://dx.doi.org/10.1155/2020/8256929.
Full textKropiwnicki, Robert. "Mandat wolny i jego granice." Przegląd Prawa Konstytucyjnego 68, no. 4 (2022): 65–75. http://dx.doi.org/10.15804/ppk.2022.04.05.
Full textManna, Mario. "Una critica alla dichiarazione di nullità del trust liquidatorio c.d. anticoncorsuale (App. Napoli, 17 giugno 2022)." N° 2 (marzo-aprile), no. 2 (April 5, 2023): 340–46. http://dx.doi.org/10.35948/1590-5586/2023.288.
Full textWang, Lihua, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, and Licheng Wang. "Certificate-based proxy decryption systems with revocability in the standard model." Information Sciences 247 (October 2013): 188–201. http://dx.doi.org/10.1016/j.ins.2013.06.026.
Full textLiu, Zhenhua, Jing Xu, Yan Liu, and Baocang Wang. "Updatable Ciphertext-Policy Attribute-Based Encryption Scheme With Traceability and Revocability." IEEE Access 7 (2019): 66832–44. http://dx.doi.org/10.1109/access.2019.2918434.
Full textWang, Yazhou, Bing Li, Yan Zhang, Jiaxin Wu, and Qianya Ma. "A Secure Biometric Key Generation Mechanism via Deep Learning and Its Application." Applied Sciences 11, no. 18 (2021): 8497. http://dx.doi.org/10.3390/app11188497.
Full textZahednejad, Behnam, Huang Teng, Saeed Kosari, and Ren Xiaojun. "A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability." International Journal of Intelligent Systems 2023 (April 29, 2023): 1–19. http://dx.doi.org/10.1155/2023/9731239.
Full textPunithavathi, P., and S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Full textWei, Guoheng, Yanlin Qin, Guangyue Kou, and Zhihong Sun. "Lightweight Certificate-Less Anonymous Authentication Key Negotiation Scheme in the 5G Internet of Vehicles." Electronics 13, no. 16 (2024): 3288. http://dx.doi.org/10.3390/electronics13163288.
Full textChatterjee, Syantani, Luciana Chamorro, and Fernando Montero. "Held in Suspense." Cambridge Journal of Anthropology 41, no. 1 (2023): 1–16. http://dx.doi.org/10.3167/cja.2023.410102.
Full textG. Nikhil, k. Babu Rao, M. Mahesh, U. Sai Kumar, and B. Surya Prabhas Rao. "Securing consumer electronics: Fingerprint template generation using DFT for enhanced security." World Journal of Advanced Engineering Technology and Sciences 11, no. 2 (2024): 493–507. http://dx.doi.org/10.30574/wjaets.2024.11.2.0133.
Full textZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu, and Peiyuan Liu. "Review on EEG-Based Authentication Technology." Computational Intelligence and Neuroscience 2021 (December 24, 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Full textFayyad, Mahmoud. "Classification of Contractual Agreements in Comparative and Islamic Jurisdictions: Does it Make Any Sense?" Arab Law Quarterly 27, no. 3 (2013): 203–29. http://dx.doi.org/10.1163/15730255-12341256.
Full textMartinico, Giuseppe, and Marta Simoncini. "Wightman and the Perils of Britain’s Withdrawal." German Law Journal 21, no. 5 (2020): 799–814. http://dx.doi.org/10.1017/glj.2020.49.
Full textFrantziou, Eleni, and Piet Eeckhout. "Brexit and Article 50 TEU: A constitutionalist reading." Common Market Law Review 54, Issue 3 (2017): 695–733. http://dx.doi.org/10.54648/cola2017058.
Full textMigaldi, Marco. "Note critiche sull’azione revocatoria indirizzata nei confronti dell’atto istitutivo (Cass. 16 giugno 2022, n. 19428)." N° 2 (marzo-aprile), no. 2 (April 5, 2023): 347–54. http://dx.doi.org/10.35948/1590-5586/2023.289.
Full textYang, Xiao-Dong, Ze-Fan Liao, Bin Shu, and Ai-Jia Chen. "Blockchain-based multi-authority revocable data sharing scheme in smart grid." Mathematical Biosciences and Engineering 20, no. 7 (2023): 11957–77. http://dx.doi.org/10.3934/mbe.2023531.
Full textTsiliotis, Charalambos. "The Irrational Brexit and the Revocability of the Withdrawal Notification of the United Kingdom to the European Council." European Public Law 24, Issue 4 (2018): 659–72. http://dx.doi.org/10.54648/euro2018038.
Full textPurkar, Dhruv. "CAN ADOPTION LAWS INCORPORATE REVOCABILITY? AN ANALYSIS OF SECTION 15 OF THE HINDU ADOPTION & MAINTENANCE ACT, 1956." LawFoyer International Journal of Doctrinal Legal Research 2, no. 3 (2024): 527–37. https://doi.org/10.70183/lijdlr.2024.v02.31.
Full textGhouzali, Sanaa, Ohoud Nafea, Abdul Wadood, and Muhammad Hussain. "Cancelable Multimodal Biometrics Based on Chaotic Maps." Applied Sciences 11, no. 18 (2021): 8573. http://dx.doi.org/10.3390/app11188573.
Full textThwin, Thein Than, and Sangsuree Vasupongayya. "Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems." Security and Communication Networks 2019 (June 25, 2019): 1–15. http://dx.doi.org/10.1155/2019/8315614.
Full textMoujahdi, Chouaib, George Bebis, Sanaa Ghouzali, Mounia Mikram, and Mohammed Rziza. "Biometric Template Protection Using Spiral Cube: Performance and Security Analysis." International Journal on Artificial Intelligence Tools 25, no. 01 (2016): 1550027. http://dx.doi.org/10.1142/s021821301550027x.
Full textLiu, Jinyuan, Yong Wang, Kun Wang, and Zhuo Liu. "An Irreversible and Revocable Template Generation Scheme Based on Chaotic System." Entropy 25, no. 2 (2023): 378. http://dx.doi.org/10.3390/e25020378.
Full textStrasser, Francislaine de Almeida Coimbra, Cleberson Aparecido de Morais Silva, and Andre Soares Sartoro. "AS DIRETIVAS ANTECIPADAS DE VONTADE E O FILME MAR ADENTRO: UM DIÁLOGO COM A AUTONOMIA PRIVADA DO INDIVÍDUO." Colloquium Socialis 5, no. 2 (2022): 26–34. http://dx.doi.org/10.5747/cs.2021.v5.n2.s136.
Full textKIM, Jihyeon, Yoon Gyo Jung, and Andrew Beng Jin Teoh. "Multimodal Biometric Template Protection Based on a Cancelable SoftmaxOut Fusion Network." Applied Sciences 12, no. 4 (2022): 2023. http://dx.doi.org/10.3390/app12042023.
Full textChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay, and and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme." Symmetry 11, no. 2 (2019): 164. http://dx.doi.org/10.3390/sym11020164.
Full textPrince Silas Kwesi Oberko, Prince Silas Kwesi Oberko, Tianang Yao Prince Silas Kwesi Oberko, Hu Xiong Tianang Yao, Saru Kumari Hu Xiong, and Sachin Kumar Saru Kumari. "Blockchain-Oriented Data Exchange Protocol With Traceability and Revocation for Smart Grid." 網際網路技術學刊 24, no. 2 (2023): 519–29. http://dx.doi.org/10.53106/160792642023032402026.
Full textTULAI, Dana-Lucia. "THE IMPACT OF THE EUROPEAN COUNCIL DIRECTIVE 86/653/EEC ON THE ROMANIAN LEGISLATION REGARDING THE TERMINATION OF THE AGENCY CONTRACT, AS A MANDATE IN COMMON INTEREST." ANNALS OF THE UNIVERSITY OF ORADEA. ECONOMIC SCIENCES 3, no. 1 (2023): 586–99. http://dx.doi.org/10.47535/1991auoes32(1)045.
Full textHuang, Yanhua, Zhendong Wu, Juan Chen, and Hui Xiang. "Privacy-Preserving Face Recognition Method Based on Randomization and Local Feature Learning." Journal of Imaging 10, no. 3 (2024): 59. http://dx.doi.org/10.3390/jimaging10030059.
Full textPerović-Vujačić, Jelena. "Conclusion of contract and legal certainty: Application of international standards in Serbian contract law." Revija Kopaonicke skole prirodnog prava 5, no. 1 (2023): 145–211. http://dx.doi.org/10.5937/rkspp2301145p.
Full textTaha, Mohammed A., and Hanaa M. Ahmed. "A fuzzy vault development based on iris images." EUREKA: Physics and Engineering, no. 5 (September 13, 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Full text