Articles with "third party" as a keyword



Photo from wikipedia

Is spatial variation in population size structures of a stream-dwelling caddisfly due to the altered effects of a predator by a third-party species?

Sign Up to like & get
recommendations!
Published in 2018 at "Hydrobiologia"

DOI: 10.1007/s10750-018-3674-0

Abstract: Predators alter abundances and life history characteristics of prey, and effects of predator–prey interactions can be altered by third-party species. Here, we examine size structures of the caddisfly, Phylloicus hansoni, in Trinidadian streams with two… read more here.

Keywords: party species; size structures; third party; size ... See more keywords
Photo from wikipedia

A Third-Party E-payment Protocol Based on Quantum Multi-proxy Blind Signature

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-018-3778-3

Abstract: A third-party E-payment protocol is presented in this paper. It is based on quantum multi-proxy blind signature. Adopting the techniques of quantum key distribution, one-time pad and quantum multi-proxy blind signature, our third-party E-payment system… read more here.

Keywords: party payment; quantum multi; payment; multi proxy ... See more keywords
Photo from wikipedia

Third-Party Policing Approaches Against Organized Crime: An Evaluation of the Yakuza Exclusion Ordinances

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Quantitative Criminology"

DOI: 10.1007/s10940-020-09466-6

Abstract: Objective Third-party policing (TPP) refers to police efforts to persuade or coerce third parties to take some responsibility for crime control and prevention. The Yakuza Exclusion Ordinances (YEOs) of Japan aim to combat organized crime… read more here.

Keywords: yakuza syndicates; organized crime; party policing; third party ... See more keywords
Photo from wikipedia

Efficient blind face recognition in the cloud

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08280-y

Abstract: Nowadays, with the maturity and wide application of face recognition technology, the recognition accuracy, recognition efficiency, and data security have attracted people’s attention. However, when face recognition is performed, face information is completely exposed to… read more here.

Keywords: information; third party; recognition; face ... See more keywords
Photo from wikipedia

A novel trusted third party based signcryption scheme

Sign Up to like & get
recommendations!
Published in 2020 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-020-09027-w

Abstract: To prevent man-in-the-middle attack, Diffie-Hellman first proposed the concept of the session key exchange protocol, in which the author remove the long term keying material at the end of the session. In our scheme, we… read more here.

Keywords: scheme; session key; trusted third; third party ... See more keywords
Photo from archive.org

Statistics attack on ‘quantum private comparison with a malicious third party’ and its improvement

Sign Up to like & get
recommendations!
Published in 2018 at "Quantum Information Processing"

DOI: 10.1007/s11128-017-1788-3

Abstract: Recently, Sun et al. (Quantum Inf Process:14:2125-2133, 2015) proposed a quantum private comparison protocol allowing two participants to compare the equality of their secrets via a malicious third party (TP). They designed an interesting trap… read more here.

Keywords: malicious third; quantum private; private comparison; third party ... See more keywords
Photo from wikipedia

Political polarization in US residents’ COVID-19 risk perceptions, policy preferences, and protective behaviors

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Risk and Uncertainty"

DOI: 10.1007/s11166-020-09336-3

Abstract: When the novel coronavirus entered the US, most US states implemented lockdown measures. In April–May 2020, state governments started political discussions about whether it would be worth the risk to reduce protective measures. In a… read more here.

Keywords: risk; third party; policy preferences; risk perceptions ... See more keywords
Photo from wikipedia

Adolescent indirect reciprocity: Evidence from incentivized economic paradigms.

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of adolescence"

DOI: 10.1016/j.adolescence.2019.06.010

Abstract: INTRODUCTION Indirect reciprocity serves as a crucial component of how we interact with strangers. Two types of indirect reciprocity can be distinguished: pay-it-forward reciprocity and third party reciprocity. Pay-it-forward reciprocity refers to behaviors where people… read more here.

Keywords: older adolescents; indirect reciprocity; third party; reciprocity ... See more keywords

Efficacy of Donor and ‘Third Party’ (Tabelecleucel) EBV-Specific T Cells for Treatment of Central Nervous System (CNS) EBV-PTLD

Sign Up to like & get
recommendations!
Published in 2019 at "Biology of Blood and Marrow Transplantation"

DOI: 10.1016/j.bbmt.2018.12.158

Abstract: Background EBV+PTLD is a life-threatening complication after hematopoietic cell transplantation (HCT) and solid organ transplantation (SOT). Introduction of EBV-specific T-cells (EBV+CTLs) as second line treatment after rituximab has reduced overall EBV+PTLD related mortality. Due to… read more here.

Keywords: cns ebv; ebv; ebv ptld; ebv ctls ... See more keywords
Photo by adigold1 from unsplash

Children's evaluations of third-party responses to unfairness: Children prefer helping over punishment

Sign Up to like & get
recommendations!
Published in 2020 at "Cognition"

DOI: 10.1016/j.cognition.2020.104374

Abstract: Third-party punishment of selfish individuals is an important mechanism to intervene against unfairness. However, there is another way in which third parties can intervene. Rather than focusing on the unfair individual, third parties can choose… read more here.

Keywords: preference; party; third party; helping punishment ... See more keywords
Photo from wikipedia

Examination of marine and vegetable oil oxidation data from a multi-year, third-party database.

Sign Up to like & get
recommendations!
Published in 2018 at "Food chemistry"

DOI: 10.1016/j.foodchem.2018.01.180

Abstract: Fish oil (FO) products constitute good sources of omega-3 fats. Oxidation data from a large third-party database of 1900 + globally-sourced FO samples were assessed. In FO products, for peroxide value (PV), 13.9% exceeded 5 mEq O2/kg (2.2% >10);… read more here.

Keywords: oxidation data; party database; oil; third party ... See more keywords