Articles with "sender" as a keyword



Photo from wikipedia

The (non-)robustness of influential cheap talk equilibria when the sender’s preferences are state independent

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Game Theory"

DOI: 10.1007/s00182-021-00774-0

Abstract: Chakraborty and Harbaugh (2010) prove the existence of influential cheap talk equilibria in one sender one receiver games when the state is multidimensional and the preferences of the sender are state-independent. We show that only… read more here.

Keywords: state; talk equilibria; state independent; influential cheap ... See more keywords
Photo from wikipedia

Sanctions in networks

Sign Up to like & get
recommendations!
Published in 2020 at "European Economic Review"

DOI: 10.1016/j.euroecorev.2020.103606

Abstract: Abstract In this paper we contribute to the sender-target models of sanctions by explicitly incorporating the linkages (social, political, or economic) that bind the sender and target to other agents. Given any network model and… read more here.

Keywords: sanctions networks; sender; target; role ... See more keywords
Photo from wikipedia

Confidence as an expression of commitment: why misplaced expressions of confidence backfire

Sign Up to like & get
recommendations!
Published in 2017 at "Evolution and Human Behavior"

DOI: 10.1016/j.evolhumbehav.2016.06.002

Abstract: Abstract Because communication can be abused by senders, it is not inherently stable. One way of stabilizing communication is for senders to commit to their messages. If a sender is committed to a message, she… read more here.

Keywords: message; expressions confidence; confidence; sender ... See more keywords
Photo by hajjidirir from unsplash

Persuasion under costly learning

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Mathematical Economics"

DOI: 10.1016/j.jmateco.2020.11.007

Abstract: Abstract A Sender (seller) tries to persuade a rationally inattentive Receiver (buyer) to take a particular action (e.g., buying). Learning is costly for the Receiver who can choose to process strictly less information than what… read more here.

Keywords: costly learning; persuasion costly; receiver; sender ... See more keywords
Photo from wikipedia

Contra la hispanidad. Ramón J. Sender y Santa Teresa de Jesús: El verbo se hizo sexo, un acto de desacralización espiritual e imperial

Sign Up to like & get
recommendations!
Published in 2020 at "Bulletin of Spanish Studies"

DOI: 10.1080/14753820.2020.1840862

Abstract: Resumen Este artículo se aproxima a la relación que Ramón J. Sender establece con el concepto de la hispanidad y el personaje de Santa Teresa de Jesús a través de su novela histórica El verbo… read more here.

Keywords: teresa jes; santa teresa; santa; sender ... See more keywords
Photo by kellysikkema from unsplash

Sequential reattempt of telecloning

Sign Up to like & get
recommendations!
Published in 2022 at "Physical Review A"

DOI: 10.1103/physreva.107.042414

Abstract: The task of a telecloning protocol is to send an arbitrary qubit possessed by a sender to multiple receivers. Instead of performing Bell measurement at the sender's node, if one applies unsharp measurement, we show… read more here.

Keywords: sequential reattempt; reattempt telecloning; number; sender ... See more keywords
Photo from wikipedia

Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3138445

Abstract: Group-oriented applications generally support communications for multiple entities (e.g., users and/or devices) through open networks. Typical requirements of group communications include secrecy, authentication, sender non-repudiation, and sender privacy. However, conventional approaches such as group key… read more here.

Keywords: sender non; non repudiation; group; group key ... See more keywords
Photo by anniespratt from unsplash

A secure anonymous proxy signcryption scheme

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2015-0014

Abstract: Abstract We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender… read more here.

Keywords: signcryption schemes; sender; anonymous proxy; proxy signcryption ... See more keywords
Photo from wikipedia

Emotion in Context: How Sender Predictability and Identity Affect Processing of Words as Imminent Personality Feedback

Sign Up to like & get
recommendations!
Published in 2019 at "Frontiers in Psychology"

DOI: 10.3389/fpsyg.2019.00094

Abstract: Recent findings suggest that communicative context affects the timing and magnitude of emotion effects in word processing. In particular, social attributions seem to be one important source of plasticity for the processing of affectively charged… read more here.

Keywords: processing; context; sender; feedback ... See more keywords