Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,830

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a ...

https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf

IG parameter K > 0 as input, runs in polynomial time in K, and outputs a prime number q, the description of two groups and of order G1 G2 q, and the description of a bilinear map ˆe : G1 G1 ! G2. Definition 3 (BDH Problem): Given a random element aP , bP , and cP , for some a; b; c compute ˆe(P; P )abc

Dr. Jie Wu - Temple University

https://cis.temple.edu/~wu/

J. Wu, "A Multi-tiered Network with Aerial and Ground Coverage," (CC 2018). J. Wu, Y. Chen, and H. Zheng, "Approximation Algorithms for Dependency-Aware Rule-Caching in Software-Defined Networks, " (GLOBECOM 2018).

中文页面 – Dr. Yang Yang's Home Page

https://sites.temple.edu/yangyang/%E4%B8%AD%E6%96%87%E9%A1%B5%E9%9D%A2/

杨博士在SSCI索引期刊上发表了超过100篇经同行评审的学术文章,2018至2023年连续被斯坦福大学评为全球前2%顶尖科学家。 此外,他获得了香港理工大学的杰出研究生年轻校友奖,并被评为国际中国旅游研究协会会士。

4. Install syslinux and configure pxelinux — High-Performance Computing ...

https://www.hpc.temple.edu/mhpc/hpc-technology/exercise2/pxelinux.html

Copy pxelinux.0, menu.c32, ldlinux.c32 and libutil.c32 into /var/lib/tftpboot. To see if TFTP is working, go to your home directory and try to download pxelinux.0 using tftp.

Justin Y. Shi Bio - Temple University

https://cis.temple.edu/~shi/

Advisory Committee Member, Pittsburgh Supercomputing Center, 1986-8. Research Exhibits, Supercomputing Conference, 1991-2018. Synergy3.0, Github link, 1993-present. Advisory Committee Member, Ben Franklin Technology Partners, 1988-2016. Deparment Chair, CIS Department, Temple University, 2007-9.

Introduction and Methodology - Temple University

https://community.mis.temple.edu/mis5203sec003spring2020/files/2019/01/COBIT-2019-Framework-Introduction-and-Methodology_res_eng_1118.pdf

Matt Loeb, Ph.D., CRISC, CISM, INTRALOT, Greece, ISACA Board Chair, 2015-2017 Robert E Stroud CGEIT, CAE, ISACA is deeply (1965-2018), FASAE, CISA, Chief Executive Officer, ISACA, USA saddened by CRISC, the passing CGEIT, of XebiaLabs, Robert E Stroud in USA, September ISACA 2018.

Guohou Shan - Happy Research - Temple University

https://community.mis.temple.edu/guohoushan/

IEEE Transactions on Information Forensics and Security, 17, 28-41. Guohou Shan, et al. How to Sell Online House for More? 17 th Pre-ICIS. Guohou Shan, et al. Inconsistency Investigation between Online Review Content and Ratings. AMCIS 2018. Guohou Shan, Dongsong Zhang, Lina Zhou, Automatic Depression Detection. INFORMS 2018.

Temple University Guest Wireless

https://its.temple.edu/sites/its/files/TempleGuestWirelessAccess.pdf

Connect to the TUguestwireless network by selecting it from the list of available Wi-Fi networks.

Xueming Luo - Fox School of Business

https://www.fox.temple.edu/directory/xueming-luo-tuf35198

Zhang, S., Chan, T.Y., Luo, X., & Wang, X. (2022). Time-Inconsistent Preferences and Strategic Self-Control in Digital Content Consumption. Marketing Science, 41 (3), 616-636. Institute for Operations Research and the Management Sciences (INFORMS). doi: 10.1287/mksc.2021.1318. Tong, S., Jia, N., Luo, X., & Fang, Z. (2021).

Fog/Edge Computing For Security, Privacy, and Applications

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Fog_Edge_Computing_BC2020.pdf

This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The ...