CINXE.COM
Search results for: private keys
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: private keys</title> <meta name="description" content="Search results for: private keys"> <meta name="keywords" content="private keys"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="private keys" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="private keys"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1908</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: private keys</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1908</span> Perfectly Keyless Commercial Vehicle</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shubha%20T.">Shubha T.</a>, <a href="https://publications.waset.org/abstracts/search?q=Latha%20H.%20K.%20E."> Latha H. K. E.</a>, <a href="https://publications.waset.org/abstracts/search?q=Yogananth%20Karuppiah"> Yogananth Karuppiah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Accessing and sharing automobiles will become much simpler thanks to the wide range of automotive use cases made possible by digital keys. This study aims to provide digital keys to car owners and drivers so they can lock or unlock their automobiles and start the engine using a smartphone or other Bluetooth low energy-enabled mobile device. Private automobile owners can digitally lend their car keys to family members or friends without having to physically meet them, possibly for a certain period of time. Owners of company automobile fleets can electronically distribute car keys to staff members, possibly granting access for a given day or length of time. Customers no longer need to physically pick up car keys at a rental desk because automobile owners can digitally transfer keys with them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NFC" title="NFC">NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=BLE" title=" BLE"> BLE</a>, <a href="https://publications.waset.org/abstracts/search?q=CCC" title=" CCC"> CCC</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20key" title=" digital key"> digital key</a>, <a href="https://publications.waset.org/abstracts/search?q=OEM" title=" OEM"> OEM</a> </p> <a href="https://publications.waset.org/abstracts/171531/perfectly-keyless-commercial-vehicle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171531.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">145</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1907</span> Keys of Success in Regional Entrepreneurial Media Collaboration Linked With a New Concept of Citizenship</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rianne%20Voet">Rianne Voet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper uses a literature review to search for keys of success for entrepreneurial regional media collaborations in the Netherlands and elsewhere. It specifies keys on general aspects: a digital-first strategy, innovation, a particular journalistic mission and a new role for the public. It outlines keys in practicalities: competencies, revenue model, legal structure, communication structure and organization structure. The paper elaborates on a new public function and a new concept of citizenship which, according to several authors in the literature, are required in order to be successful. Finally, it offers a model of keys for success in regional entrepreneurial media collaboration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=media%20collaboration" title="media collaboration">media collaboration</a>, <a href="https://publications.waset.org/abstracts/search?q=factors%20of%20success" title=" factors of success"> factors of success</a>, <a href="https://publications.waset.org/abstracts/search?q=keys%20of%20success" title=" keys of success"> keys of success</a>, <a href="https://publications.waset.org/abstracts/search?q=regional%20media%20cooperation" title=" regional media cooperation"> regional media cooperation</a> </p> <a href="https://publications.waset.org/abstracts/39291/keys-of-success-in-regional-entrepreneurial-media-collaboration-linked-with-a-new-concept-of-citizenship" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39291.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1906</span> Image Encryption Using Eureqa to Generate an Automated Mathematical Key</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Halima%20Adel%20Halim%20Shnishah">Halima Adel Halim Shnishah</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Mulvaney"> David Mulvaney</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20encryption%20algorithms" title="image encryption algorithms">image encryption algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=Eureqa" title=" Eureqa"> Eureqa</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20measurements" title=" statistical measurements"> statistical measurements</a>, <a href="https://publications.waset.org/abstracts/search?q=automated%20key%20generation" title=" automated key generation"> automated key generation</a> </p> <a href="https://publications.waset.org/abstracts/79042/image-encryption-using-eureqa-to-generate-an-automated-mathematical-key" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79042.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1905</span> Security Analysis of SIMSec Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kerem%20Ok">Kerem Ok</a>, <a href="https://publications.waset.org/abstracts/search?q=Cem%20Cevikbas"> Cem Cevikbas</a>, <a href="https://publications.waset.org/abstracts/search?q=Vedat%20Coskun"> Vedat Coskun</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Alsadi"> Mohammed Alsadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Busra%20Ozdenizci"> Busra Ozdenizci</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=End-to-end%20encryption" title="End-to-end encryption">End-to-end encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20exchange" title=" key exchange"> key exchange</a>, <a href="https://publications.waset.org/abstracts/search?q=SIM%20card" title=" SIM card"> SIM card</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20card" title=" smart card"> smart card</a> </p> <a href="https://publications.waset.org/abstracts/46503/security-analysis-of-simsec-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46503.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">284</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1904</span> Deterministic Random Number Generator Algorithm for Cryptosystem Keys</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adi%20A.%20Maaita">Adi A. Maaita</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamza%20A.%20A.%20Al%20Sewadi"> Hamza A. A. Al Sewadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptosystems" title="cryptosystems">cryptosystems</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20agreement" title=" information security agreement"> information security agreement</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20distribution" title=" key distribution"> key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20numbers" title=" random numbers"> random numbers</a> </p> <a href="https://publications.waset.org/abstracts/24886/deterministic-random-number-generator-algorithm-for-cryptosystem-keys" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">268</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1903</span> Does Inflation Affect Private Investment in Nigeria?</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amassoma%20Ditimi">Amassoma Ditimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Nwosa%20Philip%20Ifeakachukwu"> Nwosa Philip Ifeakachukwu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examined the impact of inflation on private investment in Nigeria for the period 1980 to 2012. Private investment was measured by foreign direct investment and private domestic investment. The study employed the Ordinary Least Square (OLS) technique. The empirical regression estimate showed that inflation had a positive but insignificant effect on private investment in Nigeria; implying that although an increase in inflation rate leads to a corresponding increase in private investment but however the effect was found to be insignificant. Thus, the study recommended that government should prevent high inflation rate that can negatively affect private investment in Nigeria and government should also put in place appropriate facilities that are investment enhancing in order to increase the level of both domestic and foreign private investment in Nigeria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inflation%20rate" title="inflation rate">inflation rate</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20investment" title=" private investment"> private investment</a>, <a href="https://publications.waset.org/abstracts/search?q=OLS" title=" OLS"> OLS</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a> </p> <a href="https://publications.waset.org/abstracts/33214/does-inflation-affect-private-investment-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">372</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1902</span> Religion, Education, and Nation: Anticlerical Principle of France and Private School Law of South Korea</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Minjeoung%20Kim">Minjeoung Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The education plays an important role of political socialization in politics. In Korean and in France, religion in education is situated in an important place, but religious education in school is dealt differently in two countries. In this article, the author tries to reveal the reason why in France private Catholic schools can keep their religious discipline, but in Korea, private Christian schools cannot insist Christianism to their students. This is because of the different situation of their budget. In Korea, even though private schools are named ‘private’, they cannot be managed without government subsidy but in France, private Catholic schools are owned by private foundation and their budget is based on their own resource. That’s why French private schools do not need to follow governmental guidance but not in Korean case. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=religion" title="religion">religion</a>, <a href="https://publications.waset.org/abstracts/search?q=politics" title=" politics"> politics</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20Korea" title=" South Korea"> South Korea</a>, <a href="https://publications.waset.org/abstracts/search?q=France" title=" France"> France</a> </p> <a href="https://publications.waset.org/abstracts/88673/religion-education-and-nation-anticlerical-principle-of-france-and-private-school-law-of-south-korea" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88673.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1901</span> Perception of Agricultural Extension Agents of Private Sector Participation in Extension Services in Ogun State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20O.%20Fakoya">E. O. Fakoya</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20G.%20Abiona"> B. G. Abiona</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20O.%20Soetan"> J. O. Soetan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study determined Perception of Agricultural Extension Agents of Private Sector Participation in Extension Services in Ogun State, Nigeria. Data were collected from 80 respondents with a well-structured questionnaire. The result of the findings showed that there is need for private sector participation in extension services (=4.313), private extension services has facilities than public extension services (=4.97). Private sector participated in extension services by: giving of loans and credits to farmers (=4.50). Major constraints identified by the respondents were: Transportation problem (=2.88) and lack of fund (=2.77) A significant relationship (P<0.05) exists between factors affecting public extension services(r = 0.641, p = 0.00) and private sector participation in extension services. It was concluded from the study that there is need for private sector to participate in extension service in order to improve productivity of the farmers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=agricultural%20extension" title="agricultural extension">agricultural extension</a>, <a href="https://publications.waset.org/abstracts/search?q=extension%20agent" title=" extension agent"> extension agent</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20sector" title=" private sector"> private sector</a>, <a href="https://publications.waset.org/abstracts/search?q=perception" title=" perception"> perception</a> </p> <a href="https://publications.waset.org/abstracts/12500/perception-of-agricultural-extension-agents-of-private-sector-participation-in-extension-services-in-ogun-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12500.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">588</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1900</span> Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Nalini">N. Nalini</a>, <a href="https://publications.waset.org/abstracts/search?q=Bhanu%20Prakash%20Gopularam"> Bhanu Prakash Gopularam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20confidentiality" title="data confidentiality">data confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20based%20cryptography" title=" identity based cryptography"> identity based cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20communication" title=" secure communication"> secure communication</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20stack%20key%20stone" title=" open stack key stone"> open stack key stone</a>, <a href="https://publications.waset.org/abstracts/search?q=token%20scoping" title=" token scoping"> token scoping</a> </p> <a href="https://publications.waset.org/abstracts/8920/data-confidentiality-in-public-cloud-a-method-for-inclusion-of-id-pkc-schemes-in-openstack-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8920.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1899</span> Balancing Rule of Law, Human Rights and Governance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Torkan%20Jabbariraad">Torkan Jabbariraad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the role of private regulation as a mode of governance that engages non-state actors in establishing and implementing rules or standards for public goods or services. It examines the various forms, functions, and effects of private regulation on the rule of law and human rights and considers the role and duties of public authorities in monitoring and supporting private regulation. It contends that private regulation should be regarded as a beneficial supplement to public regulation rather than a substitute or rival and that public authorities should find a balance between acknowledging the independence and variety of private actors and securing their accountability and legitimacy. It also recommends that applying the principles and values of good governance to private regulation can improve its quality and efficiency. The study relies on various sources and viewpoints from the literature on governance theory, public law, and human rights and suggests further research and discussion on the topic of private regulation and its consequences for society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=private%20regulation" title="private regulation">private regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20authority" title=" public authority"> public authority</a>, <a href="https://publications.waset.org/abstracts/search?q=governance%20theory" title=" governance theory"> governance theory</a>, <a href="https://publications.waset.org/abstracts/search?q=rule%20of%20law" title=" rule of law"> rule of law</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a> </p> <a href="https://publications.waset.org/abstracts/185985/balancing-rule-of-law-human-rights-and-governance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185985.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">40</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1898</span> Reculturing: The Key to Sustainability of Private Universities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yu%20Sing%20Ong">Yu Sing Ong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article explores the key issues and challenges facing private university leaders today. Universities are reculturing their operational processes, academic content and interactions with stakeholders. Many challenges centred around the need for university leaders to reculture the institutions and the redesigning of the teaching profession. It recommends a framework for university leaders to deal with the challenges they face. Only through reculturing, private universities can maintain the sustainability of its workforce and student population. The article has both theoretical and practical significance for private university leaders to follow. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=university%20leadership" title="university leadership">university leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=reculturing" title=" reculturing"> reculturing</a>, <a href="https://publications.waset.org/abstracts/search?q=improvement" title=" improvement"> improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20education" title=" teacher education"> teacher education</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20education" title=" private education"> private education</a> </p> <a href="https://publications.waset.org/abstracts/50099/reculturing-the-key-to-sustainability-of-private-universities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50099.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1897</span> Non-Linear Dynamic Analyses of Grouted Pile-Sleeve Connection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mogens%20Saberi">Mogens Saberi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The focus of this article is to present the experience gained from the design of a grouted pile-sleeve connection and to present simple design expressions which can be used in the preliminary design phase of such connections. The grout pile-sleeve connection serves as a connection between an offshore jacket foundation and pre-installed piles located in the seabed. The jacket foundation supports a wind turbine generator resulting in significant dynamic loads on the connection. The connection is designed with shear keys in order to optimize the overall design but little experience is currently available in the use of shear keys in such connections. It is found that the consequence of introducing shear keys in the design is a very complex stress distribution which requires special attention due to significant fatigue loads. An optimal geometrical shape of the shear keys is introduced in order to avoid large stress concentration factors and a relatively easy fabrication. The connection is analysed in ANSYS Mechanical where the grout is modelled by a non-linear material model which allows for cracking of the grout material and captures the elastic-plastic behaviour of the grout material. Special types of finite elements are used in the interface between the pile sleeve and the grout material to model the slip surface between the grout material and the steel. Based on the performed finite element modelling simple design expressions are introduced. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fatigue%20design" title="fatigue design">fatigue design</a>, <a href="https://publications.waset.org/abstracts/search?q=non-linear%20finite%20element%20modelling" title=" non-linear finite element modelling"> non-linear finite element modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20dynamics" title=" structural dynamics"> structural dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=simple%20design%20expressions" title=" simple design expressions"> simple design expressions</a> </p> <a href="https://publications.waset.org/abstracts/44333/non-linear-dynamic-analyses-of-grouted-pile-sleeve-connection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44333.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1896</span> Use of Personal Rhythm to Authenticate Encrypted Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Gonzalez">Carlos Gonzalez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20signature" title=" digital signature"> digital signature</a>, <a href="https://publications.waset.org/abstracts/search?q=keystroke%20dynamics" title=" keystroke dynamics"> keystroke dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20rhythm" title=" personal rhythm"> personal rhythm</a>, <a href="https://publications.waset.org/abstracts/search?q=public-key%20encryption" title=" public-key encryption"> public-key encryption</a> </p> <a href="https://publications.waset.org/abstracts/66737/use-of-personal-rhythm-to-authenticate-encrypted-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66737.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">304</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1895</span> Non-Cooperative Game Theory Approach for Ensuring Community Satisfaction on Public-Private Partnership Projects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jason%20Salim">Jason Salim</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhouyang%20Lu"> Zhouyang Lu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Private sector involvement in Public Private Partnership (PPP) projects may raise public suspicion, as PPP is often mistaken as merely a partnership between private and government agencies without consideration for greater “public” (community). This public marginalization is crucial to be dealt with because undermining opinion of majority may cause problems such as protests and/ or low demand. Game theory approach applied in this paper shows that probability of public acceptance towards a project is affected by overall public’s perception on Private sectors’ possible profit accumulation from the project. On the contrary, goodwill of the government and private coalition alone is not enough to minimize the probability of public opposition towards a PPP project. Additionally, the threat of loss or damage raised from public opposition does not affect the profit-maximization behavior of Private sectors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20satisfaction" title="community satisfaction">community satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title=" game theory"> game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=non-cooperative" title=" non-cooperative"> non-cooperative</a>, <a href="https://publications.waset.org/abstracts/search?q=PPP" title=" PPP"> PPP</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20policy" title=" public policy"> public policy</a> </p> <a href="https://publications.waset.org/abstracts/60803/non-cooperative-game-theory-approach-for-ensuring-community-satisfaction-on-public-private-partnership-projects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60803.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">695</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1894</span> Implications of Private Military Security Companies on Stewardship of the Profession of Arms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kevin%20Krupski">Kevin Krupski</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=stewardship" title="stewardship">stewardship</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20profession" title=" military profession"> military profession</a>, <a href="https://publications.waset.org/abstracts/search?q=civil-military" title=" civil-military"> civil-military</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/84135/implications-of-private-military-security-companies-on-stewardship-of-the-profession-of-arms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1893</span> Advertising Incentives of National Brands against Private Labels: The Case of OTC Heartburn Drugs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lu%20Liao">Lu Liao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The worldwide expansion of private labels over the past two decades not only transformed the choice sets of consumers but also forced manufacturers of national brands to design new marketing strategies to maintain their market positions. This paper empirically analyzes the impact of private labels on advertising incentives of national brands. The paper first develops a consumer demand model that incorporates spillover effects of advertising and finds positive spillovers of national brands’ advertising on demand for private label products. With the demand estimates, the researcher simulates the equilibrium prices and advertising levels for leading national brands in a counterfactual where private labels are eliminated to quantify the changes in national brands’ advertising incentives in response to the rise of private labels. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advertising" title="advertising">advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=demand%20estimation" title=" demand estimation"> demand estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=spillover%20effect" title=" spillover effect"> spillover effect</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20model" title=" structural model"> structural model</a> </p> <a href="https://publications.waset.org/abstracts/190554/advertising-incentives-of-national-brands-against-private-labels-the-case-of-otc-heartburn-drugs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190554.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">23</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1892</span> Penguins Search Optimization Algorithm for Chaotic Synchronization System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sofiane%20Bououden">Sofiane Bououden</a>, <a href="https://publications.waset.org/abstracts/search?q=Ilyes%20Boulkaibet"> Ilyes Boulkaibet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=meta-heuristic" title="meta-heuristic">meta-heuristic</a>, <a href="https://publications.waset.org/abstracts/search?q=PeSOA" title=" PeSOA"> PeSOA</a>, <a href="https://publications.waset.org/abstracts/search?q=chaotic%20systems" title=" chaotic systems"> chaotic systems</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=synchronization%20optimization" title=" synchronization optimization"> synchronization optimization</a> </p> <a href="https://publications.waset.org/abstracts/141318/penguins-search-optimization-algorithm-for-chaotic-synchronization-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141318.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">195</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1891</span> Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asmaa%20Sokrat">Asmaa Sokrat</a>, <a href="https://publications.waset.org/abstracts/search?q=Aykut%20Karaman"> Aykut Karaman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20sphere" title="public sphere">public sphere</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20sphere" title=" private sphere"> private sphere</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20connectedness" title=" social connectedness"> social connectedness</a>, <a href="https://publications.waset.org/abstracts/search?q=old%20Medina%20of%20Casablanca" title=" old Medina of Casablanca"> old Medina of Casablanca</a> </p> <a href="https://publications.waset.org/abstracts/150246/public-and-private-spaces-producing-social-connectedness-in-traditional-environment-a-study-on-old-medina-district-of-casablanca" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150246.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1890</span> Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Priti%20Kumari">Priti Kumari</a>, <a href="https://publications.waset.org/abstracts/search?q=Tricha%20Anjali"> Tricha Anjali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attacks" title="attacks">attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=body%20area%20network" title=" body area network"> body area network</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20distribution" title=" key distribution"> key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20refreshment" title=" key refreshment"> key refreshment</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-shared%20keys" title=" pre-shared keys"> pre-shared keys</a> </p> <a href="https://publications.waset.org/abstracts/49001/pre-shared-key-distribution-algorithms-attacks-for-body-area-networks-a-survey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49001.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1889</span> Does Citizens’ Involvement Always Improve Outcomes: Procedures, Incentives and Comparative Advantages of Public and Private Law Enforcement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Avdasheva%20Svetlanaa">Avdasheva Svetlanaa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kryuchkova%20Polinab"> Kryuchkova Polinab </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Comparative social efficiency of private and public enforcement of law is debated. This question is not of academic interest only, it is also important for the development of the legal system and regulations. Generally, involvement of ‘common citizens’ in public law enforcement is considered to be beneficial, while involvement of interest groups representatives is not. Institutional economics as well as law and economics consider the difference between public and private enforcement to be rather mechanical. Actions of bureaucrats in government agencies are assumed to be driven by the incentives linked to social welfare (or other indicator of public interest) and their own benefits. In contrast, actions of participants in private enforcement are driven by their private benefits. However administrative law enforcement may be designed in such a way that it would become driven mainly by individual incentives of alleged victims. We refer to this system as reactive public enforcement. Citizens may prefer using reactive public enforcement even if private enforcement is available. However replacement of public enforcement by reactive version of public enforcement negatively affects deterrence and reduces social welfare. We illustrate the problem of private vs pure public and private vs reactive public enforcement models with the examples of three legislation subsystems in Russia – labor law, consumer protection law and competition law. While development of private enforcement instead of public (especially in reactive public model) is desirable, replacement of both public and private enforcement by reactive model is definitely not. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20enforcement" title="public enforcement">public enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20complaints" title=" private complaints"> private complaints</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20errors" title=" legal errors"> legal errors</a>, <a href="https://publications.waset.org/abstracts/search?q=competition%20protection" title=" competition protection"> competition protection</a>, <a href="https://publications.waset.org/abstracts/search?q=labor%20law" title=" labor law"> labor law</a>, <a href="https://publications.waset.org/abstracts/search?q=competition%20law" title=" competition law"> competition law</a>, <a href="https://publications.waset.org/abstracts/search?q=russia" title=" russia"> russia</a> </p> <a href="https://publications.waset.org/abstracts/20957/does-citizens-involvement-always-improve-outcomes-procedures-incentives-and-comparative-advantages-of-public-and-private-law-enforcement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20957.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">494</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1888</span> Horizontal Dimension of Constitutional Social Rights</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monika%20Florczak-W%C4%85tor">Monika Florczak-Wątor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main purpose of this paper is to determine the applicability of the constitutional social rights in the so-called horizontal relations, i.e. the relations between private entities. Nowadays the constitutional rights are more and more often violated by private entities and not only by the state. The private entities interfere with the privacy of individuals, limit their freedom of expression or disturb their peaceful gatherings. International corporations subordinate individuals in a way which may limit their constitutional rights. These new realities determine the new role of the constitution in protecting human rights. The paper will aim at answering two important questions. Firstly, are the private entities obliged to respect the constitutional social rights of other private entities and can they be liable for violation of these rights? Secondly, how the constitutional social rights can receive horizontal effect? Answers to these questions will have a significant meaning for the popularization of the practice of applying the Constitution among the citizens as well as for the courts which settle disputes between them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20rights" title="social rights">social rights</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20relations" title=" private relations"> private relations</a>, <a href="https://publications.waset.org/abstracts/search?q=horizontality" title=" horizontality"> horizontality</a>, <a href="https://publications.waset.org/abstracts/search?q=constitutional%20rights" title=" constitutional rights"> constitutional rights</a> </p> <a href="https://publications.waset.org/abstracts/14718/horizontal-dimension-of-constitutional-social-rights" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1887</span> The Quality of Accounting Information of Private Companies in the Czech Republic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kate%C5%99ina%20Struha%C5%99ov%C3%A1">Kateřina Struhařová</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accounting%20information%20quality" title="accounting information quality">accounting information quality</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20statements" title=" financial statements"> financial statements</a>, <a href="https://publications.waset.org/abstracts/search?q=Czech%20Republic" title=" Czech Republic"> Czech Republic</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20companies" title=" private companies"> private companies</a> </p> <a href="https://publications.waset.org/abstracts/6498/the-quality-of-accounting-information-of-private-companies-in-the-czech-republic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6498.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">304</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1886</span> Trends of Public-Private Partnership Infrastructure in Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wasaporn%20Techapeeraparnich">Wasaporn Techapeeraparnich</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bringing private investor involving in providing public infrastructure have been increasingly used worldwide, and there is no exception for developing countries like Thailand. Recently, there is a huge investment opportunity for public-private partnership (PPP) in Thailand, especially in the transportation sector. This paper analyses the development of the PPP since the early beginning of PPP in different service sectors. It also summarizes the development of PPP and its application in terms of usage, opportunities and trends particularly in the transport sector. The results are aimed to draw some lessons learned for future development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=case%20study" title="case study">case study</a>, <a href="https://publications.waset.org/abstracts/search?q=public-private%20partnership" title=" public-private partnership"> public-private partnership</a>, <a href="https://publications.waset.org/abstracts/search?q=transportation" title=" transportation"> transportation</a>, <a href="https://publications.waset.org/abstracts/search?q=Thailand" title=" Thailand"> Thailand</a> </p> <a href="https://publications.waset.org/abstracts/54643/trends-of-public-private-partnership-infrastructure-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54643.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">434</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1885</span> Hyperchaos-Based Video Encryption for Device-To-Device Communications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samir%20Benzegane">Samir Benzegane</a>, <a href="https://publications.waset.org/abstracts/search?q=Said%20Sadoudi"> Said Sadoudi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustapha%20Djeddou"> Mustapha Djeddou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hyperchaos%20Lorenz%20system" title="hyperchaos Lorenz system">hyperchaos Lorenz system</a>, <a href="https://publications.waset.org/abstracts/search?q=hyperchaos-based%20random%20number%20generator" title=" hyperchaos-based random number generator"> hyperchaos-based random number generator</a>, <a href="https://publications.waset.org/abstracts/search?q=D2D%20communications" title=" D2D communications"> D2D communications</a>, <a href="https://publications.waset.org/abstracts/search?q=C%23" title=" C#"> C#</a> </p> <a href="https://publications.waset.org/abstracts/49358/hyperchaos-based-video-encryption-for-device-to-device-communications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49358.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">371</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1884</span> Assessment of Student Attitudes to Higher Education Service Measures: The Development of a Framework for Private Higher Education Institutions in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farrah%20Anne%20Robert">Farrah Anne Robert</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20McClelland"> Robert McClelland</a>, <a href="https://publications.waset.org/abstracts/search?q=Seng%20Kiat%20Kok"> Seng Kiat Kok</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Higher education service quality is widely regarded as key factors in the long term success of a higher education institution in attracting and retaining students. This research attempted to establish the impact of service quality on recruiting and retaining students in private higher education institutions (PHEI’s). 501 local and international students responded to a 49 item educational service measure questionnaire from PHEIs in Kuala Lumpur and Selangor, two states in Malaysia which together account for 60% of private colleges in Malaysia. Results from this research revealed that, inter-alia, facilities, employability, management and administration services, academic staff competence, curriculum and student overall experiences were key driving factors in attracting and retaining students. Lack of “campus-like building” facilities and lecturer’s effectiveness in delivering lectures were keys concerns in the provision of service quality by PHEI’s in Malaysia. Over the last decade, the Government of Malaysia has set a target of recruiting 200,000 international students to study in Malaysia by PHEI’s and PHEI’s have failed to achieve this target. This research suggests that service quality issues identified above are impacting efforts to recruit and retain both local and international students by PHEIs. The researcher recommends that further and detailed research be carried on these factors and its impact on recruitment and retention. PHEI administrators can benefit from this research by conducting an evaluation of service measures delivered in their institutions and take corrective measures. Prospective students can benefit from this study by including in their choice factors the “service quality delivery” of PHEI’s when deciding to enroll in a particular PHEI. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title="higher education">higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=recruitment" title=" recruitment"> recruitment</a>, <a href="https://publications.waset.org/abstracts/search?q=retention" title=" retention"> retention</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20quality" title=" service quality"> service quality</a> </p> <a href="https://publications.waset.org/abstracts/67653/assessment-of-student-attitudes-to-higher-education-service-measures-the-development-of-a-framework-for-private-higher-education-institutions-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67653.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1883</span> The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sahar%20Sohrabi">Sahar Sohrabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=scheduling" title=" scheduling"> scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=real-time%20private%20cloud" title=" real-time private cloud"> real-time private cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=bayesian" title=" bayesian"> bayesian</a> </p> <a href="https://publications.waset.org/abstracts/38592/the-application-of-bayesian-heuristic-for-scheduling-in-real-time-private-clouds" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38592.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1882</span> Organization Development’s Role in Environmental, Social and Governance (ESG) Sustainability in the Private Organizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karmela%20Palma%20Samson">Karmela Palma Samson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, there has been a growing interest in the implementation of Environmental, Social, and Governance (ESG) frameworks in private organizations. The COVID-19 pandemic and increasing global environmental concerns have further highlighted the importance of ESG practices in businesses. To be effective, the development and sustainability of ESG implementation require specific organizational functions. One such function is Organization Development (OD). This study aims to identify the roles of OD in the development, monitoring, and evaluation of ESG in private organizations. The role of OD in sustaining ESG implementation in private organizations was analyzed in this study. Qualitative research was conducted, which included interviews with OD practitioners to understand their role and challenges in maintaining ESG programs and initiatives. The study found that OD practitioners have low participation in managing ESG programs, initiatives, and indicators. However, the study also revealed that the OD function is crucial for the development, monitoring, and evaluation of ESG implementation in private organizations. In essence, the study highlights the importance of the OD function in ensuring the success of ESG implementation in private organizations. With their expertise in organizational development, OD practitioners can contribute significantly to the development, implementation, and evaluation of ESG initiatives. Therefore, private organizations should involve their OD departments in ESG implementation to ensure that they are sustainable, effective, and aligned with their organizational goals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ESG" title="ESG">ESG</a>, <a href="https://publications.waset.org/abstracts/search?q=organization%20development" title=" organization development"> organization development</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20sector" title=" private sector"> private sector</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainability" title=" sustainability"> sustainability</a> </p> <a href="https://publications.waset.org/abstracts/170344/organization-developments-role-in-environmental-social-and-governance-esg-sustainability-in-the-private-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170344.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1881</span> Differential Item Functioning in the Vocabulary Test of Grade 7 Students in Public and Private Schools</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dave%20Kenneth%20Tayao%20Cayado">Dave Kenneth Tayao Cayado</a>, <a href="https://publications.waset.org/abstracts/search?q=Carlo%20P.%20Magno"> Carlo P. Magno</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The most common source of bias detected are those of gender and socioeconomic status. The present study investigated the Differential Item Functioning (DIF) or item bias between public and private school students in a vocabulary test. Studies on DIF were expanded by using the type of school as a source of bias. There were 200 participants in this study. 100 came from a public secondary school and 100 came from a private secondary school. The vocabulary skills of students were measured using a standardized vocabulary test for grade 7 students. Using DIF, specifically the Rasch-Welch approach, it was found that out of 24 items, 12 were biased for a specific group. The vocabulary skills on the use of slang, idiomatic expression, personification, collocations, and partitive relations were biased for private schools while the use of slang and homonymous words were biased for public school students. The analysis debunked the trend that private school students are outperforming public school students in terms of academic achievement. It was revealed that there are some competencies that private school students are having difficulty and vice versa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=differential%20item%20functioning" title="differential item functioning">differential item functioning</a>, <a href="https://publications.waset.org/abstracts/search?q=item%20bias" title=" item bias"> item bias</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20school%20students" title=" public school students"> public school students</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20school%20students" title=" private school students"> private school students</a>, <a href="https://publications.waset.org/abstracts/search?q=vocabulary" title=" vocabulary"> vocabulary</a> </p> <a href="https://publications.waset.org/abstracts/98866/differential-item-functioning-in-the-vocabulary-test-of-grade-7-students-in-public-and-private-schools" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98866.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1880</span> The Development of Private Housing Schemes to Address the Housing Problem: A Case Study of Islamabad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zafar%20Iqbal%20Zafar">Zafar Iqbal Zafar</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdul%20Waheed"> Abdul Waheed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Capital Development Authority (CDA) Ordinance 1960 requires CDA to acquire land for the provision of housing in Islamabad. However, the pace of residential development was slow and the demand for housing was increasing rapidly. To resolve the growing housing problem, CDA involved the private sector in the development of housing schemes. Detailed bye-laws for regulation of private housing schemes were prepared and these bylaws were called “Modalities & Procedures”. This paper explains how the Modalities and Procedures of CDA have been successful in regulating the development of private housing schemes in Islamabad. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=housing%20schemes" title="housing schemes">housing schemes</a>, <a href="https://publications.waset.org/abstracts/search?q=master%20plan" title=" master plan"> master plan</a>, <a href="https://publications.waset.org/abstracts/search?q=development%20works" title=" development works"> development works</a>, <a href="https://publications.waset.org/abstracts/search?q=zoning%20regulations" title=" zoning regulations"> zoning regulations</a> </p> <a href="https://publications.waset.org/abstracts/145778/the-development-of-private-housing-schemes-to-address-the-housing-problem-a-case-study-of-islamabad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145778.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">201</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1879</span> Using Combination of Sets of Features of Molecules for Aqueous Solubility Prediction: A Random Forest Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammet%20Baldan">Muhammet Baldan</a>, <a href="https://publications.waset.org/abstracts/search?q=Emel%20Timu%C3%A7in"> Emel Timuçin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Generally, absorption and bioavailability increase if solubility increases; therefore, it is crucial to predict them in drug discovery applications. Molecular descriptors and Molecular properties are traditionally used for the prediction of water solubility. There are various key descriptors that are used for this purpose, namely Drogan Descriptors, Morgan Descriptors, Maccs keys, etc., and each has different prediction capabilities with differentiating successes between different data sets. Another source for the prediction of solubility is structural features; they are commonly used for the prediction of solubility. However, there are little to no studies that combine three or more properties or descriptors for prediction to produce a more powerful prediction model. Unlike available models, we used a combination of those features in a random forest machine learning model for improved solubility prediction to better predict and, therefore, contribute to drug discovery systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=solubility" title="solubility">solubility</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forest" title=" random forest"> random forest</a>, <a href="https://publications.waset.org/abstracts/search?q=molecular%20descriptors" title=" molecular descriptors"> molecular descriptors</a>, <a href="https://publications.waset.org/abstracts/search?q=maccs%20keys" title=" maccs keys"> maccs keys</a> </p> <a href="https://publications.waset.org/abstracts/186736/using-combination-of-sets-of-features-of-molecules-for-aqueous-solubility-prediction-a-random-forest-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">46</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=63">63</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=64">64</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=private%20keys&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>