Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Hydrobiologia"
DOI: 10.1007/s10750-018-3674-0
Abstract: Predators alter abundances and life history characteristics of prey, and effects of predator–prey interactions can be altered by third-party species. Here, we examine size structures of the caddisfly, Phylloicus hansoni, in Trinidadian streams with two…
read more here.
Keywords:
party species;
size structures;
third party;
size ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-018-3778-3
Abstract: A third-party E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our third-party E-payment system…
read more here.
Keywords:
party payment;
quantum multi;
payment;
multi proxy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Quantitative Criminology"
DOI: 10.1007/s10940-020-09466-6
Abstract: Objective Third-party policing (TPP) refers to police efforts to persuade or coerce third parties to take some responsibility for crime control and prevention. The Yakuza Exclusion Ordinances (YEOs) of Japan aim to combat organized crime…
read more here.
Keywords:
yakuza syndicates;
organized crime;
party policing;
third party ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08280-y
Abstract: Nowadays, with the maturity and wide application of face recognition technology, the recognition accuracy, recognition efficiency, and data security have attracted people’s attention. However, when face recognition is performed, face information is completely exposed to…
read more here.
Keywords:
information;
third party;
recognition;
face ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-09027-w
Abstract: To prevent man-in-the-middle attack, Diffie-Hellman first proposed the concept of the session key exchange protocol, in which the author remove the long term keying material at the end of the session. In our scheme, we…
read more here.
Keywords:
scheme;
session key;
trusted third;
third party ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2018 at "Quantum Information Processing"
DOI: 10.1007/s11128-017-1788-3
Abstract: Recently, Sun et al. (Quantum Inf Process:14:2125-2133, 2015) proposed a quantum private comparison protocol allowing two participants to compare the equality of their secrets via a malicious third party (TP). They designed an interesting trap…
read more here.
Keywords:
malicious third;
quantum private;
private comparison;
third party ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Risk and Uncertainty"
DOI: 10.1007/s11166-020-09336-3
Abstract: When the novel coronavirus entered the US, most US states implemented lockdown measures. In April–May 2020, state governments started political discussions about whether it would be worth the risk to reduce protective measures. In a…
read more here.
Keywords:
risk;
third party;
policy preferences;
risk perceptions ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of adolescence"
DOI: 10.1016/j.adolescence.2019.06.010
Abstract: INTRODUCTION Indirect reciprocity serves as a crucial component of how we interact with strangers. Two types of indirect reciprocity can be distinguished: pay-it-forward reciprocity and third party reciprocity. Pay-it-forward reciprocity refers to behaviors where people…
read more here.
Keywords:
older adolescents;
indirect reciprocity;
third party;
reciprocity ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Biology of Blood and Marrow Transplantation"
DOI: 10.1016/j.bbmt.2018.12.158
Abstract: Background EBV+PTLD is a life-threatening complication after hematopoietic cell transplantation (HCT) and solid organ transplantation (SOT). Introduction of EBV-specific T-cells (EBV+CTLs) as second line treatment after rituximab has reduced overall EBV+PTLD related mortality. Due to…
read more here.
Keywords:
cns ebv;
ebv;
ebv ptld;
ebv ctls ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Cognition"
DOI: 10.1016/j.cognition.2020.104374
Abstract: Third-party punishment of selfish individuals is an important mechanism to intervene against unfairness. However, there is another way in which third parties can intervene. Rather than focusing on the unfair individual, third parties can choose…
read more here.
Keywords:
preference;
party;
third party;
helping punishment ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Food chemistry"
DOI: 10.1016/j.foodchem.2018.01.180
Abstract: Fish oil (FO) products constitute good sources of omega-3 fats. Oxidation data from a large third-party database of 1900 + globally-sourced FO samples were assessed. In FO products, for peroxide value (PV), 13.9% exceeded 5 mEq O2/kg (2.2% >10);…
read more here.
Keywords:
oxidation data;
party database;
oil;
third party ... See more keywords