CINXE.COM

Search results for: trusted third party.

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: trusted third party.</title> <meta name="description" content="Search results for: trusted third party."> <meta name="keywords" content="trusted third party."> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="trusted third party." name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="trusted third party."> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 113</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: trusted third party.</h1> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">113</span> Decentralised Edge Authentication in the Industrial Enterprise IoT Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=C.%20P.%20Autry">C. P. Autry</a>, <a href="https://publications.waset.org/search?q=A.W.%20Roscoe"> A.W. Roscoe </a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Authentication" title="Authentication">Authentication</a>, <a href="https://publications.waset.org/search?q=enterprise%20IoT%20cybersecurity" title=" enterprise IoT cybersecurity"> enterprise IoT cybersecurity</a>, <a href="https://publications.waset.org/search?q=public%20key%20infrastructure" title=" public key infrastructure"> public key infrastructure</a>, <a href="https://publications.waset.org/search?q=trusted%20third%20party." title=" trusted third party."> trusted third party.</a> </p> <a href="https://publications.waset.org/10011583/decentralised-edge-authentication-in-the-industrial-enterprise-iot-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10011583/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10011583/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10011583/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10011583/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10011583/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10011583/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10011583/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10011583/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10011583/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10011583/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10011583.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">112</span> Features of Party Construction in the Course of Political Modernization of Kazakhstan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Zhankuliyeva%20S.%20A.">Zhankuliyeva S. A.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article considers the main features of party construction in the course of political modernization of Kazakhstan. Along with consideration of party construction author analyzed how the transformation of the party system was fulfilled in Kazakhstan. Besides the basic stages in the course of party construction were explained by the author. The statistical data is cited. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=elections" title="elections">elections</a>, <a href="https://publications.waset.org/search?q=multi-party%20system" title=" multi-party system"> multi-party system</a>, <a href="https://publications.waset.org/search?q=party%20construction" title=" party construction"> party construction</a>, <a href="https://publications.waset.org/search?q=political%20pluralism" title=" political pluralism"> political pluralism</a>, <a href="https://publications.waset.org/search?q=political%20party" title=" political party"> political party</a>, <a href="https://publications.waset.org/search?q=Republic%20of%20Kazakhstan%20%28RK%29" title=" Republic of Kazakhstan (RK)"> Republic of Kazakhstan (RK)</a> </p> <a href="https://publications.waset.org/2081/features-of-party-construction-in-the-course-of-political-modernization-of-kazakhstan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/2081/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/2081/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/2081/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/2081/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/2081/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/2081/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/2081/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/2081/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/2081/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/2081/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/2081.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1536</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">111</span> The Role of the Dominant Party of the Republic of Kazakhstan and China&#039;s Ruling Party in a Country&#039;s Modernization: Similarities and Differences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Dinara%20B.%20Dauyen">Dinara B. Dauyen</a>, <a href="https://publications.waset.org/search?q=Nurzhamal%20A.%20Aldabek"> Nurzhamal A. Aldabek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>The purpose of this work is to identify the positive and negative aspects of parties- participation in the country-s modernization, which in turn, will help a country to determine the necessary steps to improve the social-economic development. The article considers a question of the role of the dominating party of Kazakhstan and ruling party of China in the country-s modernization. Using a comparative analysis reveals differences between the People&#39;s Democratic Party &ldquo;Nur Otan&quot; and the Communist Party of China. It is discussed the policy of carrying out of modernization, the main actions of political parties of both countries with a view of modernization implementation.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=China%27s%20modernization" title="China&#039;s modernization">China&#039;s modernization</a>, <a href="https://publications.waset.org/search?q=dominant%20party" title=" dominant party"> dominant party</a>, <a href="https://publications.waset.org/search?q=ruling%20party" title=" ruling party"> ruling party</a>, <a href="https://publications.waset.org/search?q=modernization%20of%20Kazakhstan." title=" modernization of Kazakhstan."> modernization of Kazakhstan.</a> </p> <a href="https://publications.waset.org/8733/the-role-of-the-dominant-party-of-the-republic-of-kazakhstan-and-chinas-ruling-party-in-a-countrys-modernization-similarities-and-differences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/8733/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/8733/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/8733/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/8733/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/8733/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/8733/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/8733/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/8733/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/8733/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/8733/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/8733.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1539</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">110</span> Opposition Parties and the Politics of Opposition in Africa: A Critical Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Wondwosen%20Teshome%20B.">Wondwosen Teshome B. </a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>The major aim of this paper is to investigate the opposition politics in Africa. The paper also examines the status and the role, the contributions and the weaknesses of opposition1 political parties in Africa, particularly in transitional democracies that emerged in the 1990s. In Africa, many of the opposition parties appear or become active only during an election, and disappear when the election is over. It is found out that most of the opposition parties in Africa are established around the personalities of individuals, lack internal democracy, suffer from inter-party and intra-party conflicts, have severe shortage of finance, and lack strong base and experience. Their weaknesses also include bad organization and weak connection with the popular constituencies. The paper concludes that most of the weaknesses of the African opposition parties emanate from the incumbents- hostile policies, which are mostly aimed at fragmenting and weakening the opposition groups.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Africa" title="Africa">Africa</a>, <a href="https://publications.waset.org/search?q=Hybrid%20regime" title=" Hybrid regime"> Hybrid regime</a>, <a href="https://publications.waset.org/search?q=Incumbent%20party" title=" Incumbent party"> Incumbent party</a>, <a href="https://publications.waset.org/search?q=Neopatrimonialsim" title=" Neopatrimonialsim"> Neopatrimonialsim</a>, <a href="https://publications.waset.org/search?q=Opposition%20party" title=" Opposition party"> Opposition party</a>, <a href="https://publications.waset.org/search?q=Political%20party" title=" Political party"> Political party</a>, <a href="https://publications.waset.org/search?q=Pseudo-democracy." title=" Pseudo-democracy."> Pseudo-democracy.</a> </p> <a href="https://publications.waset.org/315/opposition-parties-and-the-politics-of-opposition-in-africa-a-critical-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/315/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/315/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/315/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/315/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/315/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/315/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/315/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/315/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/315/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/315/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/315.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">4719</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">109</span> Cryptanalysis of Yang-Li-Liao’s Simple Three-Party Key Exchange (S-3PAKE) Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Hae-Soon%20Ahn">Hae-Soon Ahn</a>, <a href="https://publications.waset.org/search?q=Eun-Jun%20Yoon"> Eun-Jun Yoon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Three-party password authenticated key exchange (3PAKE) protocols are widely deployed on lots of remote user authentication system due to its simplicity and convenience of maintaining a human-memorable password at client side to achieve secure communication within a hostile network. Recently, an improvement of 3PAKE protocol by processing a built-in data attached to other party for identity authentication to individual data was proposed by some researchers. However, this paper points out that the improved 3PAKE protocol is still vulnerable to undetectable on-line dictionary attack and off-line dictionary attack.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Three-party%20key%20exchange" title="Three-party key exchange">Three-party key exchange</a>, <a href="https://publications.waset.org/search?q=3PAKE" title=" 3PAKE"> 3PAKE</a>, <a href="https://publications.waset.org/search?q=Passwordauthenticated%20key%20exchange" title=" Passwordauthenticated key exchange"> Passwordauthenticated key exchange</a>, <a href="https://publications.waset.org/search?q=Network%20security" title=" Network security"> Network security</a>, <a href="https://publications.waset.org/search?q=Dictionary%20attack" title=" Dictionary attack"> Dictionary attack</a> </p> <a href="https://publications.waset.org/17161/cryptanalysis-of-yang-li-liaos-simple-three-party-key-exchange-s-3pake-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/17161/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/17161/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/17161/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/17161/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/17161/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/17161/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/17161/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/17161/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/17161/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/17161/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/17161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2123</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">108</span> A Fair Non-transfer Exchange Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Cheng-Chi%20Lee">Cheng-Chi Lee</a>, <a href="https://publications.waset.org/search?q=Min-Shiang%20Hwang"> Min-Shiang Hwang</a>, <a href="https://publications.waset.org/search?q=Shu-Yin%20Hsiao"> Shu-Yin Hsiao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network exchange is now widely used. However, it still cannot avoid the problems evolving from network exchange. For example. A buyer may not receive the order even if he/she makes the payment. For another example, the seller possibly get nothing even when the merchandise is sent. Some studies about the fair exchange have proposed protocols for the design of efficiency and exploited the signature property to specify that two parties agree on the exchange. The information about purchased item and price are disclosed in this way. This paper proposes a new fair network payment protocol with off-line trusted third party. The proposed protocol can protect the buyers- purchase message from being traced. In addition, the proposed protocol can meet the proposed requirements. The most significant feature is Non-transfer property we achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=E-commerce" title="E-commerce">E-commerce</a>, <a href="https://publications.waset.org/search?q=digital%20signature" title=" digital signature"> digital signature</a>, <a href="https://publications.waset.org/search?q=fair%20exchange" title=" fair exchange"> fair exchange</a>, <a href="https://publications.waset.org/search?q=security." title=" security."> security.</a> </p> <a href="https://publications.waset.org/9093/a-fair-non-transfer-exchange-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/9093/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/9093/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/9093/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/9093/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/9093/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/9093/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/9093/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/9093/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/9093/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/9093/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/9093.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1347</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">107</span> Electronic Government in the GCC Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=A.M.%20Al-Khouri">A.M. Al-Khouri</a>, <a href="https://publications.waset.org/search?q=J.%20Bal"> J. Bal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>The study investigated the practices of organisations in Gulf Cooperation Council (GCC) countries with regards to G2C egovernment maturity. It reveals that e-government G2C initiatives in the surveyed countries in particular, and arguably around the world in general, are progressing slowly because of the lack of a trusted and secure medium to authenticate the identities of online users. The authors conclude that national ID schemes will play a major role in helping governments reap the benefits of e-government if the three advanced technologies of smart card, biometrics and public key infrastructure (PKI) are utilised to provide a reliable and trusted authentication medium for e-government services.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=e-Government" title="e-Government">e-Government</a>, <a href="https://publications.waset.org/search?q=G2C" title=" G2C"> G2C</a>, <a href="https://publications.waset.org/search?q=national%20ID" title=" national ID"> national ID</a>, <a href="https://publications.waset.org/search?q=online%0D%0Aauthentication" title=" online authentication"> online authentication</a>, <a href="https://publications.waset.org/search?q=biometrics" title=" biometrics"> biometrics</a>, <a href="https://publications.waset.org/search?q=PKI" title=" PKI"> PKI</a>, <a href="https://publications.waset.org/search?q=smart%20card." title=" smart card."> smart card.</a> </p> <a href="https://publications.waset.org/10055/electronic-government-in-the-gcc-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10055/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10055/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10055/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10055/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10055/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10055/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10055/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10055/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10055/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10055/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10055.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2034</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">106</span> The Role of the Injured Party&#039;s Fault in the Apportionment of Damages in Tort Law: A Comparative-Historical Study between Common Law and Islamic Law</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Alireza%20Tavakolinia">Alireza Tavakolinia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>In order to understand the role of the injured party's fault in dividing liability, we studied its historical background. In common law, the traditional contributory negligence rule was a complete defense. Then the legislature and judicial procedure modified that rule to one of apportionment. In Islamic law, too, the Action rule was at first used when the injured party was the sole cause, but jurists expanded the scope of this rule, so this rule was used in cases where both the injured party's fault and that of the other party are involved. There are some popular approaches for apportionment of damages. Some common law countries like Britain had chosen ‘the causal potency approach’ and ‘fixed apportionment’. Islamic countries like Iran have chosen both ‘the relative blameworthiness’ and ‘equal apportionment’ approaches. The article concludes that both common law and Islamic law believe in the division of responsibility between a wrongdoer claimant and the defendant. In contrast, in the apportionment of responsibility, Islamic law mostly believes in equal apportionment that is way easier and saves time and money, but common law legal systems have chosen the causal potency approach which is more complicated than the rival approach but is fairer.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Contributory%20negligence" title="Contributory negligence">Contributory negligence</a>, <a href="https://publications.waset.org/search?q=common%20law" title=" common law"> common law</a>, <a href="https://publications.waset.org/search?q=Islamic%20Law" title=" Islamic Law"> Islamic Law</a>, <a href="https://publications.waset.org/search?q=Tort%20Law." title=" Tort Law."> Tort Law.</a> </p> <a href="https://publications.waset.org/10012129/the-role-of-the-injured-partys-fault-in-the-apportionment-of-damages-in-tort-law-a-comparative-historical-study-between-common-law-and-islamic-law" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10012129/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10012129/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10012129/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10012129/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10012129/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10012129/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10012129/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10012129/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10012129/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10012129/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10012129.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">861</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">105</span> An Analytical Study on the Politics of Defection in India </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Diya%20Sarkar">Diya Sarkar</a>, <a href="https://publications.waset.org/search?q=Prafulla%20C.%20Mishra"> Prafulla C. Mishra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>In a parliamentary system, party discipline is the impulse; when it falls short, the government usually falls. Conceivably, the platform of Indian politics suffers with innumerous practical disorders. The politics of defection is one such specie entailing gross miscarriage of fair conduct turning politics into a game of thrones (powers). This practice of political nomaditude can trace its seed in the womb of British House of Commons. Therein, if a legislator was found to cross the floor, the party considered him disloyal. In other words, the legislator lost his allegiance to his former party by joining another party. This very phenomenon, in practice has a two way traffic i.e. ruling party to the opposition party or vice versa<em>.</em> The democracies like USA, Australia and Canada were also aware of this fashion of swapping loyalties. There have been several instances of great politicians changing party allegiance, for example Winston Churchill, Ramsay McDonald, William Gladstone etc. Nevertheless, it is interesting to cite that irrespective of such practice of changing party allegiance, none of the democracies in the west ever desired or felt the need to legislatively ban defections. But, exceptionally India can be traced to have passed anti-defection laws. The politics of defection had been a unique popular phenomenon on the floor of Indian Parliamentary system gradually gulping the democratic essence and synchronization of the Federation. This study is both analytical and doctrinal, which tries to examine whether representative democracy has lost its essence due to political nomadism. The present study also analyzes the classical as well as contemporary pulse of floor crossing amidst dynastic politics in a representative democracy. It will briefly discuss the panorama of defections under the Indian federal structure in the light of the anti-defection law and an attempt has been made to add valuable suggestions to streamline remedy for the still prevalent political defections.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Constitutional%20law" title="Constitutional law">Constitutional law</a>, <a href="https://publications.waset.org/search?q=defection" title=" defection"> defection</a>, <a href="https://publications.waset.org/search?q=democracy" title=" democracy"> democracy</a>, <a href="https://publications.waset.org/search?q=political%20anti-trust." title=" political anti-trust."> political anti-trust.</a> </p> <a href="https://publications.waset.org/10008725/an-analytical-study-on-the-politics-of-defection-in-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10008725/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10008725/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10008725/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10008725/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10008725/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10008725/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10008725/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10008725/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10008725/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10008725/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10008725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2729</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">104</span> Podemos Party Origin: From Social Protest to Spanish Parliament</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=V%C3%ADctor%20Manuel%20Mu%C3%B1oz-S%C3%A1nchez">Víctor Manuel Muñoz-Sánchez</a>, <a href="https://publications.waset.org/search?q=Antonio%20Manuel%20P%C3%A9rez-Flores"> Antonio Manuel Pérez-Flores</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper analyzes the institutionalization of social protest in Spain. In the current crisis Podemos party seems to represent the political positions of the most affected citizens by the economic situation. It studies using quantitative techniques (statistical bivariate analysis), focusing on the exploitation of several bases of statistics data from the Center for Sociological and Research of Spanish Government, 15M movement characterization to its institutionalization in the Podemos party. Making a comparison between the participant&#39;s profile by the 15M and the social bases of Podemos votes. Data on the transformation of the socio-demographic profile of the fans, connoisseurs and 15M participants and voters are given. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Collective%20action" title="Collective action">Collective action</a>, <a href="https://publications.waset.org/search?q=emerging%20parties" title=" emerging parties"> emerging parties</a>, <a href="https://publications.waset.org/search?q=political%20parties" title=" political parties"> political parties</a>, <a href="https://publications.waset.org/search?q=social%20protest." title=" social protest."> social protest.</a> </p> <a href="https://publications.waset.org/10003458/podemos-party-origin-from-social-protest-to-spanish-parliament" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10003458/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10003458/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10003458/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10003458/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10003458/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10003458/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10003458/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10003458/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10003458/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10003458/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10003458.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2123</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">103</span> Political Finance in Africa: Ethiopia as a Case Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Wondwosen%20Teshome%20B.">Wondwosen Teshome B.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Since 1991 Ethiopia has officially adopted multi-party democracy. At present, there are 89 registered political parties in the country. Though political parties play an important role in the functioning of a democratic government, how to fund them is an issue of major concern. Political parties and individual candidates running for political office have to raise funds for election campaigns, and to survive as political candidates. The aim of this paper is to examine party funding problems in Africa by taking the case of Ethiopia as an example. The paper also evaluates the motives of local and international donors in giving financial and material support to political parties in emerging democracies and assesses the merits and de-merits of their donations.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Africa" title="Africa">Africa</a>, <a href="https://publications.waset.org/search?q=State%20funding" title=" State funding"> State funding</a>, <a href="https://publications.waset.org/search?q=Ethiopia" title=" Ethiopia"> Ethiopia</a>, <a href="https://publications.waset.org/search?q=Political%20finance" title=" Political finance"> Political finance</a>, <a href="https://publications.waset.org/search?q=Political%20party" title=" Political party"> Political party</a>, <a href="https://publications.waset.org/search?q=Western%20donors." title=" Western donors."> Western donors.</a> </p> <a href="https://publications.waset.org/8779/political-finance-in-africa-ethiopia-as-a-case-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/8779/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/8779/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/8779/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/8779/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/8779/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/8779/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/8779/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/8779/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/8779/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/8779/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/8779.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2147</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">102</span> Electoral Violence in Africa: Experience from Ethiopia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Wondwosen%20Teshome">Wondwosen Teshome</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>It is impossible to think about democracy without elections. The litmus test of any electoral process in any country is the possibility of a one time minority to become a majority at another time and a peaceful transition of power. In many countries in Sub-Saharan Africa though the multi-party elections appeared to be competitive they failed the acid test of democracy: peaceful regime change in a free and fair election. Failure to solve electoral disputes might lead to bloody electoral conflicts as witnessed in many emerging democracies in Africa. The aim of this paper is to investigate electoral conflicts in Africa since the end of the Cold War by using the 2005 post-election violence in Ethiopia as a case study. In Ethiopia, the coming to power of the EPRDF in 1991 marked the fall of the Derg dictatorial military government and the beginning of a multi-party democracy. The country held multi-party parliamentary elections in 1995, 2000, and 2005 where the ruling EPRDF party &ldquo;won&quot; the elections through violence, involving intimidation, manipulation, detentions of political opponents, torture, and political assassinations. The 2005 electoral violence was the worst electoral violence in the country-s political history that led to the death of 193 protestors and the imprisonment of more than 40, 000 people. It is found out that the major causes of the 2005 Ethiopian election were the defeat of the ruling party in the election and its attempt to reverse the poll results by force; the Opposition-s lack of decisive leadership; the absence of independent courts and independent electoral management body; and the ruling party-s direct control over the army and police.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Africa" title="Africa">Africa</a>, <a href="https://publications.waset.org/search?q=Ethiopia" title=" Ethiopia"> Ethiopia</a>, <a href="https://publications.waset.org/search?q=Election" title=" Election"> Election</a>, <a href="https://publications.waset.org/search?q=Electoral%20violence" title=" Electoral violence"> Electoral violence</a>, <a href="https://publications.waset.org/search?q=NEBE." title=" NEBE."> NEBE.</a> </p> <a href="https://publications.waset.org/7262/electoral-violence-in-africa-experience-from-ethiopia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/7262/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/7262/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/7262/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/7262/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/7262/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/7262/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/7262/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/7262/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/7262/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/7262/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/7262.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">3329</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">101</span> Service Architecture for 3rd Party Operator&#039;s Participation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=F.%20Sarabchi">F. Sarabchi</a>, <a href="https://publications.waset.org/search?q=A.%20H.%20Darvishan"> A. H. Darvishan</a>, <a href="https://publications.waset.org/search?q=H.%20Yeganeh"> H. Yeganeh</a>, <a href="https://publications.waset.org/search?q=H.%20Ahmadian"> H. Ahmadian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Next generation networks with the idea of convergence of service and control layer in existing networks (fixed, mobile and data) and with the intention of providing services in an integrated network, has opened new horizon for telecom operators. On the other hand, economic problems have caused operators to look for new source of income including consider new services, subscription of more users and their promotion in using morenetwork resources and easy participation of service providers or 3rd party operators in utilizing networks. With this requirement, an architecture based on next generation objectives for service layer is necessary. In this paper, a new architecture based on IMS model explains participation of 3rd party operators in creation and implementation of services on an integrated telecom network.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Service%20model" title="Service model">Service model</a>, <a href="https://publications.waset.org/search?q=IMS" title=" IMS"> IMS</a>, <a href="https://publications.waset.org/search?q=API" title=" API"> API</a>, <a href="https://publications.waset.org/search?q=Scripting%20language" title=" Scripting language"> Scripting language</a>, <a href="https://publications.waset.org/search?q=JAIN" title=" JAIN"> JAIN</a>, <a href="https://publications.waset.org/search?q=Parlay." title=" Parlay."> Parlay.</a> </p> <a href="https://publications.waset.org/3471/service-architecture-for-3rd-party-operators-participation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/3471/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/3471/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/3471/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/3471/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/3471/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/3471/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/3471/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/3471/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/3471/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/3471/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/3471.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1473</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">100</span> The Study of Cost Accounting in S Company Based On TDABC</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Heng%20Ma">Heng Ma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Third-party warehousing logistics has an important role in the development of external logistics. At present, the third-party logistics in our country is still a new industry, the accounting system has not yet been established, the current financial accounting system of third-party warehousing logistics is mainly in the traditional way of thinking, and only able to provide the total cost information of the entire enterprise during the accounting period, unable to reflect operating indirect cost information. In order to solve the problem of third-party logistics industry cost information distortion, improve the level of logistics cost management, the paper combines theoretical research and case analysis method to reflect cost allocation by building third-party logistics costing model using Time-Driven Activity-Based Costing(TDABC), and takes S company as an example to account and control the warehousing logistics cost.Based on the idea of &ldquo;Products consume activities and activities consume resources&rdquo;, TDABC put time into the main cost driver and use time-consuming equation resources assigned to cost objects. In S company, the objects focuses on three warehouse, engaged with warehousing and transportation (the second warehouse, transport point) service. These three warehouse respectively including five departments, Business Unit, Production Unit, Settlement Center, Security Department and Equipment Division, the activities in these departments are classified by in-out of storage forecast, in-out of storage or transit and safekeeping work. By computing capacity cost rate, building the time-consuming equation, the paper calculates the final operation cost so as to reveal the real cost.The numerical analysis results show that the TDABC can accurately reflect the cost allocation of service customers and reveal the spare capacity cost of resource center, verifies the feasibility and validity of TDABC in third-party logistics industry cost accounting. It inspires enterprises focus on customer relationship management and reduces idle cost to strengthen the cost management of third-party logistics enterprises.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Third-party%20logistics%20enterprises" title="Third-party logistics enterprises">Third-party logistics enterprises</a>, <a href="https://publications.waset.org/search?q=TDABC" title=" TDABC"> TDABC</a>, <a href="https://publications.waset.org/search?q=cost%20management" title=" cost management"> cost management</a>, <a href="https://publications.waset.org/search?q=S%20company." title=" S company."> S company.</a> </p> <a href="https://publications.waset.org/9998495/the-study-of-cost-accounting-in-s-company-based-on-tdabc" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/9998495/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/9998495/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/9998495/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/9998495/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/9998495/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/9998495/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/9998495/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/9998495/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/9998495/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/9998495/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/9998495.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2435</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">99</span> Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Xi%20Xiao">Xi Xiao</a>, <a href="https://publications.waset.org/search?q=Chunhui%20Chen"> Chunhui Chen</a>, <a href="https://publications.waset.org/search?q=Xinyu%20Liu"> Xinyu Liu</a>, <a href="https://publications.waset.org/search?q=Guangwu%20Hu"> Guangwu Hu</a>, <a href="https://publications.waset.org/search?q=Yong%20Jiang"> Yong Jiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users&rsquo; real locations. The thorough analysis indicates that the users&rsquo; location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Client%2Fserver%20architecture" title="Client/server architecture">Client/server architecture</a>, <a href="https://publications.waset.org/search?q=location%20sharing" title=" location sharing"> location sharing</a>, <a href="https://publications.waset.org/search?q=mobile%20online%20social%20networks" title=" mobile online social networks"> mobile online social networks</a>, <a href="https://publications.waset.org/search?q=privacy-preserving." title=" privacy-preserving."> privacy-preserving.</a> </p> <a href="https://publications.waset.org/10006400/privacy-preserving-location-sharing-system-with-clientserver-architecture-in-mobile-online-social-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10006400/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10006400/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10006400/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10006400/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10006400/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10006400/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10006400/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10006400/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10006400/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10006400/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10006400.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1314</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">98</span> An Authentication Protocol for Quantum Enabled Mobile Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Natarajan%20Venkatachalam">Natarajan Venkatachalam</a>, <a href="https://publications.waset.org/search?q=Subrahmanya%20V.%20R.%20K.%20Rao"> Subrahmanya V. R. K. Rao</a>, <a href="https://publications.waset.org/search?q=Vijay%20Karthikeyan%20Dhandapani"> Vijay Karthikeyan Dhandapani</a>, <a href="https://publications.waset.org/search?q=Swaminathan%20Saravanavel"> Swaminathan Saravanavel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Quantum%20cryptography" title="Quantum cryptography">Quantum cryptography</a>, <a href="https://publications.waset.org/search?q=quantum%20key%20distribution" title=" quantum key distribution"> quantum key distribution</a>, <a href="https://publications.waset.org/search?q=wireless%20quantum%20communication" title=" wireless quantum communication"> wireless quantum communication</a>, <a href="https://publications.waset.org/search?q=authentication%20protocol" title=" authentication protocol"> authentication protocol</a>, <a href="https://publications.waset.org/search?q=quantum%0D%0Aenabled%20device" title=" quantum enabled device"> quantum enabled device</a>, <a href="https://publications.waset.org/search?q=trusted%20third%20party." title=" trusted third party."> trusted third party.</a> </p> <a href="https://publications.waset.org/10009849/an-authentication-protocol-for-quantum-enabled-mobile-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10009849/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10009849/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10009849/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10009849/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10009849/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10009849/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10009849/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10009849/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10009849/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10009849/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10009849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1222</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">97</span> Cloud Computing Cryptography &quot;State-of-the-Art&quot;</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Omer%20K.%20Jasim">Omer K. Jasim</a>, <a href="https://publications.waset.org/search?q=Safia%20Abbas"> Safia Abbas</a>, <a href="https://publications.waset.org/search?q=El-Sayed%20M.%20El-Horbaty"> El-Sayed M. El-Horbaty</a>, <a href="https://publications.waset.org/search?q=Abdel-Badeeh%20M.%20Salem"> Abdel-Badeeh M. Salem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users&rsquo; data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the &ldquo;keys generation and management&rdquo; mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Cloud%20Computing" title="Cloud Computing">Cloud Computing</a>, <a href="https://publications.waset.org/search?q=Cloud%20Encryption%20Model" title=" Cloud Encryption Model"> Cloud Encryption Model</a>, <a href="https://publications.waset.org/search?q=Quantum%20Key%20Distribution." title=" Quantum Key Distribution."> Quantum Key Distribution.</a> </p> <a href="https://publications.waset.org/17363/cloud-computing-cryptography-state-of-the-art" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/17363/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/17363/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/17363/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/17363/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/17363/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/17363/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/17363/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/17363/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/17363/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/17363/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/17363.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">4094</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">96</span> From Separatism to Coalition: Variants in Language Politics and Leadership Pattern in Dravidian Movement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Subramaniam%20Chandran">Subramaniam Chandran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper describes the evolution of language politics and the part played by political leaders with reference to the Dravidian parties in Tamil Nadu. It explores the interesting evolution from separatism to coalition in sustaining the values of parliamentary democracy and federalism. It seems that the appropriation of language politics is fully ascribed to the DMK leadership under Annadurai and Karunanidhi. For them, the Tamil language is a self-determining power, a terrain of nationhood, and a perennial source of social and political powers. The DMK remains a symbol of Tamil nationalist party playing language politics in the interest of the Tamils. Though electoral alliances largely determine the success, the language politics still has significant space in the politics of Tamil Nadu. Ironically, DMK moves from the periphery to centre for getting national recognition for the Tamils as well as for its own maximization of power. The evolution can be seen in two major phases as: language politics for party building; and language politics for state building with three successive political processes, namely, language politics in the process of separatism, representative politics and coalition. The much pronounced Dravidian Movement is radical enough to democratize the party ideology to survive the spirit of parliamentary democracy. This has secured its own rewards in terms of political power. The political power provides the means to achieve the social and political goal of the political party. Language politics and leadership pattern actualized this trend though the movement is shifted from separatism to coalition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Language%20politics" title="Language politics">Language politics</a>, <a href="https://publications.waset.org/search?q=cultural%20nationalism" title=" cultural nationalism"> cultural nationalism</a>, <a href="https://publications.waset.org/search?q=leadership" title="leadership">leadership</a>, <a href="https://publications.waset.org/search?q=social%20justice" title=" social justice"> social justice</a> </p> <a href="https://publications.waset.org/9250/from-separatism-to-coalition-variants-in-language-politics-and-leadership-pattern-in-dravidian-movement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/9250/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/9250/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/9250/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/9250/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/9250/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/9250/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/9250/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/9250/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/9250/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/9250/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/9250.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1962</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">95</span> Mapping the Digital Landscape: An Analysis of Party Differences between Conventional and Digital Policy Positions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Daniel%20Schwarz">Daniel Schwarz</a>, <a href="https://publications.waset.org/search?q=Jan%20Fivaz"> Jan Fivaz</a>, <a href="https://publications.waset.org/search?q=Alessia%20Neuroni"> Alessia Neuroni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Although digitization is a buzzword in almost every election campaign, the political parties leave voters largely in the dark about their specific positions on digital issues. In the run-up to the 2019 elections in Switzerland, the &lsquo;Digitization Monitor&rsquo; project (DMP) was launched in order to change this situation. Within the framework of the DMP, all 4,736 candidates were surveyed about their digital policy positions and values. The DMP is designed as a digital policy supplement to the existing &lsquo;smartvote&rsquo; voting advice application. This enabled a direct comparison of the digital policy attitudes according to the DMP with the topics of the &lsquo;smartvote&rsquo; questionnaire which are comprehensive in content but mainly related to conventional policy areas. This paper&rsquo;s main research goal is to analyze and visualize possible differences between conventional and digital policy areas in terms of response patterns between and within political parties. The analysis is based on dimensionality reduction methods (multidimensional scaling and principal component analysis) for the visualization of inter-party differences, and on standard deviation as a measure of variation for the evaluation of intra-party unity. The results reveal that digital issues show a lower degree of inter-party polarization compared to conventional policy areas. Thus, the parties have more common ground in issues on digitization than in conventional policy areas. In contrast, the study reveals a mixed picture regarding intra-party unity. Homogeneous parties show a lower degree of unity in digitization issues whereas parties with heterogeneous positions in conventional areas have more united positions in digital areas. All things considered, the findings are encouraging as less polarized conditions apply to the debate on digital development compared to conventional politics. For the future, it would be desirable if in further countries similar projects to the DMP could emerge to broaden the basis for conclusions.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Comparison%20of%20political%20issue%20dimensions" title="Comparison of political issue dimensions">Comparison of political issue dimensions</a>, <a href="https://publications.waset.org/search?q=digital%20awareness%20of%20candidates" title=" digital awareness of candidates"> digital awareness of candidates</a>, <a href="https://publications.waset.org/search?q=digital%20policy%20space" title=" digital policy space"> digital policy space</a>, <a href="https://publications.waset.org/search?q=party%20positions%20on%20digital%20issues." title=" party positions on digital issues."> party positions on digital issues.</a> </p> <a href="https://publications.waset.org/10011467/mapping-the-digital-landscape-an-analysis-of-party-differences-between-conventional-and-digital-policy-positions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10011467/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10011467/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10011467/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10011467/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10011467/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10011467/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10011467/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10011467/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10011467/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10011467/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10011467.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">651</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">94</span> Security Enhanced RFID Middleware System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Jieun%20Song">Jieun Song</a>, <a href="https://publications.waset.org/search?q=Taesung%20Kim"> Taesung Kim</a>, <a href="https://publications.waset.org/search?q=Sokjoon%20Lee"> Sokjoon Lee</a>, <a href="https://publications.waset.org/search?q=Howon%20Kim"> Howon Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, the RFID (Radio Frequency Identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But that concern has shifted to RFID software like as high-valued e-business applications, RFID middleware and related development tools. However, due to the high sensitivity of data and service transaction within the RFID network, security consideration must be addressed. In order to guarantee trusted e-business based on RFID technology, we propose a security enhanced RFID middleware system. Our proposal is compliant with EPCglobal ALE (Application Level Events), which is standard interface for middleware and its clients. We show how to provide strengthened security and trust by protecting transported data between middleware and its client, and stored data in middleware. Moreover, we achieve the identification and service access control against illegal service abuse. Our system enables secure RFID middleware service and trusted e-business service. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=RFID%20Middleware" title="RFID Middleware">RFID Middleware</a>, <a href="https://publications.waset.org/search?q=ALE%20%28Application%20Level%20Events%29" title=" ALE (Application Level Events)"> ALE (Application Level Events)</a>, <a href="https://publications.waset.org/search?q=Security." title=" Security."> Security.</a> </p> <a href="https://publications.waset.org/11722/security-enhanced-rfid-middleware-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/11722/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/11722/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/11722/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/11722/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/11722/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/11722/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/11722/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/11722/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/11722/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/11722/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/11722.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2067</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">93</span> U.S. Supreme Court Justices and Partisanship: Support for the President and Solicitor General</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=James%20Meernik">James Meernik</a>, <a href="https://publications.waset.org/search?q=Joseph%20Ignagni"> Joseph Ignagni</a>, <a href="https://publications.waset.org/search?q=Rebecca%20Deen"> Rebecca Deen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper analyzes the extent to which the justices of the U.S. Supreme Court cast votes that support the positions of the president, or more generally the Executive Branch. Can presidents count on such deference from those justices they nominate or those whom are nominated by other presidents of the same party? Or, do the justices demonstrate judicial independence and impartiality such that they are not so predisposed to vote in favor of arguments of their nominating president-s party? The results suggest that while in general the justices do not exhibit any marked tendency to partisan support of presidents, more recent and conservative Supreme Court justices are significantly more likely to support Republican presidents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Separation%20of%20Powers" title="Separation of Powers">Separation of Powers</a>, <a href="https://publications.waset.org/search?q=Solicitor%20General" title=" Solicitor General"> Solicitor General</a>, <a href="https://publications.waset.org/search?q=U.S.%0APresident" title=" U.S. President"> U.S. President</a> </p> <a href="https://publications.waset.org/8405/us-supreme-court-justices-and-partisanship-support-for-the-president-and-solicitor-general" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/8405/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/8405/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/8405/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/8405/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/8405/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/8405/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/8405/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/8405/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/8405/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/8405/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/8405.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1418</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">92</span> Two Undetectable On-line Dictionary Attacks on Debiao et al.’s S-3PAKE Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Sung-Bae%20Choi">Sung-Bae Choi</a>, <a href="https://publications.waset.org/search?q=Sang-Yoon%20Yoon"> Sang-Yoon Yoon</a>, <a href="https://publications.waset.org/search?q=Eun-Jun%20Yoon"> Eun-Jun Yoon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>In 2011, Debiao et al. pointed out that S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures to eliminate the security vulnerability of the S-3PAKE. Nevertheless, this paper points out their enhanced S-3PAKE protocol is still vulnerable to undetectable on-line dictionary attacks unlike their claim.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Authentication" title="Authentication">Authentication</a>, <a href="https://publications.waset.org/search?q=3PAKE" title=" 3PAKE"> 3PAKE</a>, <a href="https://publications.waset.org/search?q=password" title=" password"> password</a>, <a href="https://publications.waset.org/search?q=three-party%20key%20exchange" title=" three-party key exchange"> three-party key exchange</a>, <a href="https://publications.waset.org/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/search?q=dictionary%20attacks." title=" dictionary attacks."> dictionary attacks.</a> </p> <a href="https://publications.waset.org/14051/two-undetectable-on-line-dictionary-attacks-on-debiao-et-als-s-3pake-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/14051/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/14051/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/14051/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/14051/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/14051/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/14051/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/14051/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/14051/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/14051/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/14051/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/14051.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1638</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">91</span> Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Jie%20Zhang">Jie Zhang</a>, <a href="https://publications.waset.org/search?q=Qianyu%20Guo"> Qianyu Guo</a>, <a href="https://publications.waset.org/search?q=Tieyi%20Zhang"> Tieyi Zhang</a>, <a href="https://publications.waset.org/search?q=Zhiyong%20Feng"> Zhiyong Feng</a>, <a href="https://publications.waset.org/search?q=Xiaohong%20Li"> Xiaohong Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>The widespread popularity of mobile devices and the development of artificial intelligence (AI) have led to the widespread adoption of deep learning (DL) in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace, a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Additionally, we propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. Using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We conduct an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace outperformed FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Mobile%20computing" title="Mobile computing">Mobile computing</a>, <a href="https://publications.waset.org/search?q=deep%20learning%20apps" title=" deep learning apps"> deep learning apps</a>, <a href="https://publications.waset.org/search?q=sensitive%0D%0Ainformation" title=" sensitive information"> sensitive information</a>, <a href="https://publications.waset.org/search?q=static%20analysis." title=" static analysis."> static analysis.</a> </p> <a href="https://publications.waset.org/10012983/toward-understanding-and-testing-deep-learning-information-flow-in-deep-learning-based-android-apps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10012983/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10012983/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10012983/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10012983/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10012983/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10012983/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10012983/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10012983/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10012983/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10012983/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10012983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">598</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">90</span> Criteria of Selecting 3pl Provider: A Literature Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Rajesh%20Gupta">Rajesh Gupta</a>, <a href="https://publications.waset.org/search?q=Anish%20Sachdeva"> Anish Sachdeva</a>, <a href="https://publications.waset.org/search?q=Arvind%20Bhardwaj"> Arvind Bhardwaj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Shippers are concentrating on the core competency to stay competitive and outsourcing the logistic activities to the third party who is expert in this field. This third party logistics (3PL) is drawing the due attention at government, industrial, academicians and practitioner-s levels. If the logistics cost in India can be brought down from the current level of 13% of GDP to 9% (level in the U.S.), the savings would be around Rs 3 lakh crore approximately per annum. But the problem with the shippers is to select the suitable 3PL provider. Various criteria for selection of 3PL have been listed in the literature which are discussed in the present literature review. Every shipper will select the criteria suitable to its own requirement which have to be dynamically reviewed time to time so as to fit in the ever changing environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=3PL" title="3PL">3PL</a>, <a href="https://publications.waset.org/search?q=criteria" title=" criteria"> criteria</a>, <a href="https://publications.waset.org/search?q=shipper" title=" shipper"> shipper</a>, <a href="https://publications.waset.org/search?q=outsourcing" title=" outsourcing"> outsourcing</a> </p> <a href="https://publications.waset.org/10355/criteria-of-selecting-3pl-provider-a-literature-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10355/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10355/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10355/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10355/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10355/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10355/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10355/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10355/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10355/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10355/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10355.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">5068</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">89</span> Inflation and Unemployment Rates as Indicators of the Transition European Union Countries Monetary Policy Orientation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Elza%20Jurun">Elza Jurun</a>, <a href="https://publications.waset.org/search?q=Damir%20Piplica"> Damir Piplica</a>, <a href="https://publications.waset.org/search?q=Tea%20Poklepovi%C4%87"> Tea Poklepović</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p class="Abstract" style="text-indent:10.2pt">Numerous studies carried out in the developed&nbsp; western democratic countries have shown that the ideological&nbsp; framework of the governing party has a significant influence on the&nbsp; monetary policy. The executive authority consisting of a left-wing&nbsp; party gives a higher weight to unemployment suppression and central&nbsp; bank implements a more expansionary monetary policy. On the other&nbsp; hand, right-wing governing party considers the monetary stability to&nbsp; be more important than unemployment suppression and in such a&nbsp; political framework the main macroeconomic objective becomes the&nbsp; inflation rate reduction. The political framework conditions in the&nbsp; transition countries which are new European Union (EU) members&nbsp; are still highly specific in relation to the other EU member countries.&nbsp; In the focus of this paper is the question whether the same&nbsp; monetary policy principles are valid in these transitional countries as&nbsp; well as they apply in developed western democratic EU member&nbsp; countries. The data base consists of inflation rate and unemployment&nbsp; rate for 11 transitional EU member countries covering the period&nbsp; from 2001 to 2012. The essential information for each of these 11&nbsp; countries and for each year of the observed period is right or left&nbsp; political orientation of the ruling party.&nbsp; In this paper we use t-statistics to test our hypothesis that there are&nbsp; differences in inflation and unemployment between right and left&nbsp; political orientation of the governing party. To explore the influence&nbsp; of different countries, through years and different political&nbsp; orientations descriptive statistics is used. Inflation and unemployment&nbsp; should be strongly negatively correlated through time, which is tested&nbsp; using Pearson correlation coefficient.&nbsp; Regarding the fact whether the governing authority is consisted&nbsp; from left or right politically oriented parties, monetary authorities&nbsp; will adjust its policy setting the higher priority on lower inflation or&nbsp; unemployment reduction.&nbsp;</p> <p class="Abstract" style="margin-top:0cm"><o:p></o:p></p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Inflation%20rate" title="Inflation rate">Inflation rate</a>, <a href="https://publications.waset.org/search?q=monetary%20policy%20orientation" title=" monetary policy orientation"> monetary policy orientation</a>, <a href="https://publications.waset.org/search?q=transition%20EU%20countries" title=" transition EU countries"> transition EU countries</a>, <a href="https://publications.waset.org/search?q=unemployment%20rate." title=" unemployment rate."> unemployment rate.</a> </p> <a href="https://publications.waset.org/9997764/inflation-and-unemployment-rates-as-indicators-of-the-transition-european-union-countries-monetary-policy-orientation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/9997764/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/9997764/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/9997764/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/9997764/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/9997764/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/9997764/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/9997764/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/9997764/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/9997764/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/9997764/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/9997764.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">2324</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">88</span> Legal Problems with the Thai Political Party Establishment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Paiboon%20Chuwatthanakij">Paiboon Chuwatthanakij</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>Each of the countries around the world has different ways of management and many of them depend on people to administrate their country. Thailand, for example, empowers the sovereignty of Thai people under constitution; however, our Thai voting system is not able to flow fast enough under the current Political management system. The sovereignty of Thai people is addressing this problem through representatives during current elections, in order to set a new policy for the countries ideology to change in the House and the Cabinet. This is particularly important in a democracy to be developed under our current political institution. The Organic Act on Political Parties 2007 is the establishment we have today that is causing confrontations within the establishment. There are many political parties that will soon be abolished. Many political parties have already been subsidized. This research study is to analyze the legal problems with the political party establishment under the Organic Act on Political Parties 2007. This will focus on the freedom of each political establishment compared to an effective political operation. Textbooks and academic papers will be referenced from studies home and abroad. The study revealed that Organic Act on Political Parties 2007 has strict provisions on the political structure over the number of members and the number of branches involved within political parties system. Such operations shall be completed within one year; but under the existing laws the small parties are not able to participate with the bigger parties. The cities are capable of fulfilling small political party requirements but fail to become coalesced because the current laws won&#39;t allow them to be united as one. It is important to allow all independent political parties to join our current political structure. Board members can&rsquo;t help the smaller parties to become a large organization under the existing Thai laws. Creating a new establishment that functions efficiently throughout all branches would be one solution to these legal problems between all political parties. With this new operation, individual political parties can participate with the bigger parties during elections. Until current political institutions change their system to accommodate public opinion, these current Thai laws will continue to be a problem with all political parties in Thailand.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Coalesced" title="Coalesced">Coalesced</a>, <a href="https://publications.waset.org/search?q=Political%20Party" title=" Political Party"> Political Party</a>, <a href="https://publications.waset.org/search?q=Sovereignty." title=" Sovereignty."> Sovereignty.</a> </p> <a href="https://publications.waset.org/9999050/legal-problems-with-the-thai-political-party-establishment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/9999050/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/9999050/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/9999050/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/9999050/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/9999050/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/9999050/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/9999050/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/9999050/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/9999050/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/9999050/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/9999050.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1842</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">87</span> Digital Forensics for Electronic Commerce on the Web</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Ryuya%20Uda">Ryuya Uda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> On existing online shopping on the web, SSL and password are usually used to achieve the secure trades. SSL shields communication from the third party who is not related with the trade, and indicates that the trader's web site is authenticated by one of the certification authority. Password certifies a customer as the same person who has visited the trader's web site before, and protects the customer's privacy such as what the customer has bought on the site. However, there is no forensics for the trades in those cased above. With existing methods, no one can prove what is ordered by customers, how many products are ordered and even whether customers have ordered or not. The reason is that the third party has to guess what were traded with logs that are held by traders and by customers. The logs can easily be created, deleted and forged since they are electronically stored. To enhance security with digital forensics for electronic commerce on the web, I indicate a secure method with cellular phones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Cellular%20Phone" title="Cellular Phone">Cellular Phone</a>, <a href="https://publications.waset.org/search?q=Digital%20Forensics" title=" Digital Forensics"> Digital Forensics</a>, <a href="https://publications.waset.org/search?q=ElectronicCommerce" title=" ElectronicCommerce"> ElectronicCommerce</a>, <a href="https://publications.waset.org/search?q=Information%20Security" title=" Information Security"> Information Security</a> </p> <a href="https://publications.waset.org/12362/digital-forensics-for-electronic-commerce-on-the-web" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/12362/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/12362/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/12362/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/12362/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/12362/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/12362/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/12362/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/12362/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/12362/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/12362/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/12362.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1839</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">86</span> Ethiopian Opposition Political Parties and Rebel Fronts: Past and Present</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Wondwosen%20Teshome%20B.">Wondwosen Teshome B.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In a representative democracy political parties promote vital competition on different policy issues and play essential roles by offering ideological alternatives. They also give channels for citizens- participation in government decision-making processes and they are significant conduits and interpreters of information about government. This paper attempts to examine how opposition political parties and rebel fronts emerged in Ethiopia, and examines their present conditions. In this paper, selected case studies of political parties and rebel fronts are included to highlight the status and the role of opposition groups in the country in the three successive administrations: Haile Selassie (1930-1974), Derg (1974- 1991), and EPRDF (1991-Present). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Ethiopia" title="Ethiopia">Ethiopia</a>, <a href="https://publications.waset.org/search?q=Hybrid%20regime" title=" Hybrid regime"> Hybrid regime</a>, <a href="https://publications.waset.org/search?q=Incumbent" title=" Incumbent"> Incumbent</a>, <a href="https://publications.waset.org/search?q=Multi-Partyelection" title=" Multi-Partyelection"> Multi-Partyelection</a>, <a href="https://publications.waset.org/search?q=Opposition%20Party" title=" Opposition Party"> Opposition Party</a>, <a href="https://publications.waset.org/search?q=Political%20Party" title=" Political Party"> Political Party</a>, <a href="https://publications.waset.org/search?q=Rebel%20fronts." title=" Rebel fronts."> Rebel fronts.</a> </p> <a href="https://publications.waset.org/14561/ethiopian-opposition-political-parties-and-rebel-fronts-past-and-present" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/14561/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/14561/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/14561/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/14561/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/14561/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/14561/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/14561/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/14561/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/14561/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/14561/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/14561.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">5377</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">85</span> Taiwan’s Democratic Institutions: The Electoral Rise and Recall of Kuomintang’s Han Kuo-yu Mayor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Ryan%20Brading">Ryan Brading</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>The results of Taiwan’s presidential election, which took place on 11 January 2020, were alarming for the Kuomintang (KMT). A party that was once the pillar of Taiwan’s institutional apparatus is now losing its direction. Since 2016, the inability of KMT to construct a winning presidential election campaign strategy has made its Chinese ancestry an obstacle in Taiwan’s vibrant and transparent democracy. The appearance of the little-known legislator Han Kuo-yu as the leadership alternative opened the possibility of reigniting the party. Han’s victory in the Kaohsiung mayoral election in November 2018 provided hope that Han could also win the presidency. Wrongly described as a populist, Han, however, was defeated in the January 2020 presidential race. This article analyses why Han is not a populist, his triumph in Kaohsiung, humiliation in running for the presidency and suffering a complete ‘loss of face’ when Kaohsiungers democratically ousted him from the mayoral post on 6 June 2020.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Populism" title="Populism">Populism</a>, <a href="https://publications.waset.org/search?q=%E2%80%981992%20Consensus%E2%80%99" title=" ‘1992 Consensus’"> ‘1992 Consensus’</a>, <a href="https://publications.waset.org/search?q=Taiwan" title=" Taiwan"> Taiwan</a>, <a href="https://publications.waset.org/search?q=youth%20vote" title=" youth vote"> youth vote</a>, <a href="https://publications.waset.org/search?q=Han%E2%80%99s%20recall." title=" Han’s recall."> Han’s recall.</a> </p> <a href="https://publications.waset.org/10012854/taiwans-democratic-institutions-the-electoral-rise-and-recall-of-kuomintangs-han-kuo-yu-mayor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10012854/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10012854/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10012854/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10012854/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10012854/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10012854/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10012854/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10012854/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10012854/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10012854/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10012854.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card publication-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">84</span> A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/search?q=Hebberly%20Ahatlan">Hebberly Ahatlan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p>The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, Information Technology (IT) and Operational Technology (OT) convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.</p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/search?q=Digitalization" title="Digitalization">Digitalization</a>, <a href="https://publications.waset.org/search?q=IT%2FOT%20convergence" title=" IT/OT convergence"> IT/OT convergence</a>, <a href="https://publications.waset.org/search?q=semantic%20interoperability" title=" semantic interoperability"> semantic interoperability</a>, <a href="https://publications.waset.org/search?q=TEIA%20alliance" title=" TEIA alliance"> TEIA alliance</a>, <a href="https://publications.waset.org/search?q=VPP." title=" VPP."> VPP.</a> </p> <a href="https://publications.waset.org/10013609/a-proposal-for-a-secure-and-interoperable-data-framework-for-energy-digitalization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/10013609/apa" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">APA</a> <a href="https://publications.waset.org/10013609/bibtex" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">BibTeX</a> <a href="https://publications.waset.org/10013609/chicago" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Chicago</a> <a href="https://publications.waset.org/10013609/endnote" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">EndNote</a> <a href="https://publications.waset.org/10013609/harvard" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">Harvard</a> <a href="https://publications.waset.org/10013609/json" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">JSON</a> <a href="https://publications.waset.org/10013609/mla" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">MLA</a> <a href="https://publications.waset.org/10013609/ris" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">RIS</a> <a href="https://publications.waset.org/10013609/xml" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">XML</a> <a href="https://publications.waset.org/10013609/iso690" target="_blank" rel="nofollow" class="btn btn-primary btn-sm">ISO 690</a> <a href="https://publications.waset.org/10013609.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/search?q=trusted%20third%20party.&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/search?q=trusted%20third%20party.&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/search?q=trusted%20third%20party.&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/search?q=trusted%20third%20party.&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10