Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8801
Liturgiese sang op die kruispad tussen tradisie en vernuwing
Published 1997-12-01“…A well-founded insight in the following aspects will secure a sound balance between tradition and renewal in a present day liturgical theology and practice: the historical background of the relationship between liturgy and singing, the liturgical function of singing, liturgical communication through singing, as well as a hymnological aesthetics and liturgical ethics. …”
Get full text
Article -
8802
Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans
Published 2017-06-01“…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.http://edis.ifas.ufl.edu/uw429 …”
Get full text
Article -
8803
Sustainability Goals in Economic Policy — Economic Considerations
Published 2022-05-01“…This should be prevented by formulating the goals as concretely and legally securely as possible and by building up competence in the authorities entrusted with their implementation.…”
Get full text
Article -
8804
USE OF CORPORATE ACCOUNTING AND CONTROL SYSTEM IN MANAGEMENT
Published 2019-12-01“…According to the results of the study a conclusion has been made, that the corporate accounting and control system is one of the modern algorithmized and automated tools of the corporate management system of economic development strategy in a highly competitive environment and the unpredictability of the behavior of economic entities in the market of goods, works, services, currency, securities, etc., which is integrated with other management systems in the mode of their parallel automation.…”
Get full text
Article -
8805
ID-based signature without trusted PKG
Published 2008-01-01“…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
Get full text
Article -
8806
Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Published 2011-01-01“…Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. …”
Get full text
Article -
8807
Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans
Published 2017-06-01“…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.http://edis.ifas.ufl.edu/uw429 …”
Get full text
Article -
8808
Efficient ID-based multicast authentication protocol in wireless sensor networks
Published 2009-01-01“…In order to overcome the drawback of the existent multicast authentication protocol in WSN,the PKC-based services for WSN was explored and an efficient ID-based multicast authentication protocol was presented.The protocol with message recovery provided the feature that the message was recoverable from the signature and hence the computa-tional cost and communication overhead of the protocol had been reduced greatly.This protocol was proved secure against existential forgery under adaptive chosen message and ID attack in the random oracle model.The performance analysis results show that the proposed scheme can effectively reduce resource cost,adapt the characteristics of WSN and is clearly superior to the HESS,Zhang and BLS protocols.…”
Get full text
Article -
8809
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Published 2007-01-01“…Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the following properties: multiple secrets can be shared at the same time in a group of shareholders.The secret shares sent to shareholders are publicly verifiable.The public information with respect to each shared secret is publicly verifiable.And the supply of false shares in the process of secret recovery can be prevented.Analysis shows that the verifiable multi-secret sharing schemes constructed by our method are not only secure,but also efficient.…”
Get full text
Article -
8810
Cattell-Braasch Maneuver: A Gadget to Manipulate Abdominal Aortic Aneurysm in a Patient with a Left-Sided Inferior Vena Cava
Published 2019-01-01“…He underwent open surgery, and we employed the Cattell-Braasch maneuver to approach the abdominal aortic aneurysm from the right side. This enabled securing of the abdominal aortic aneurysm neck without mobilizing or dissecting the inferior vena cava. …”
Get full text
Article -
8811
Editorial Vol9 no2
Published 2010-10-01“…We have been fortunate in securing the publication of the main papers from this inspiring event, and these form the core of this issue of the Scottish Journal of Residential Child Care. …”
Article -
8812
Farm gate profitability of organic and conventional farming systems in the tropics
Published 2024-12-01“…In instances where premium prices for non-cash crops are secured, their profitability can even surpass that of cash crops. …”
Get full text
Article -
8813
Treatment of Spontaneous Subarachnoid Hemorrhage: A 20‐Year National Inpatient Sample Review
Published 2025-01-01“…Patients undergoing surgery to secure an aneurysm were more severely ill through time yet experienced a stable hospital mortality rate.…”
Get full text
Article -
8814
Bedřich ze Strážnice a husitské posádky ve Slezsku
Published 2020-12-01“…In Silesia, the priest Bedřich of Strážnice helped to transform the system operating among the garrisons in Central and South Moravia, including the collection of food in the form of tributes, obtaining the spoils of war, supplying through the convoys sent from the Hussite domain, and the cooperation with local elites. At the same time, securing supplies determined the main features of military operations. …”
Get full text
Article -
8815
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks
Published 2011-10-01“…More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. …”
Get full text
Article -
8816
Attribute-based encryption with hidden policies in the access tree
Published 2015-09-01“…The existing policies-hidden attribute-based encryption (ABE) schemes could only support a limited access structure,which resulted in weak expressiveness.A new structure of access tree was thus proposed to integrate attribute hiding and secret sharing into “and” gate,“or” gate and “threshold” gate.Then,a tree-based policies-hidden scheme was constructed by using composite order bilinear groups.Under dual system encryption,the scheme was proved to be secure.Furthermore,the analysis and experiment demonstrate that the scheme realize policies-hidden in the complex ac-cess structure without increasing the overhead of computation.As a result,it is more feasible and flexible for applica-tions.…”
Get full text
Article -
8817
Integrity verification protocol based on privacy homomorphism data aggregation
Published 2014-11-01“…Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation (IV-PHDA) was presented.The protocol uses homomorphism encryption to ensure data privacy,then it used random detection nodes to detect the integrity of the aggregated results to verify whether the aggregation node faithfully transmit each data packet.The theoretical analysis and simulation comparison verify the performance of the algorithm,the results show that this protocol can detect data integrity through transmission,and achieve better privacy protection and higher data accuracy.…”
Get full text
Article -
8818
Sovereign Debt Restructurings in Grenada: Causes, Processes, Outcomes, and Lessons Learned
Published 2018-08-01“…However, the first restructuring was not able to secure long-term debt sustainability. Grenada’s restructuring experience shows the importance of (1) establishing appropriate debt restructuring objectives; (2) committing to policy reforms and maintaining ownership of the restructuring goals; and (3) engaging closely and having clear communications with creditors.…”
Get full text
Article -
8819
Piracy around the Horn of Africa
Published 2009-09-01“…Piracy around the Horn of Africa has risen to a level serious enough for the international community to take concerted action to secure an international sea lane. However, the efforts so far have been initiated mainly by the international community while regional efforts are only just beginning. …”
Get full text
Article -
8820
Évaluer l’impact d’un changement d’échelle sur la durabilité des services d’eau : la méthode ABAFAD
Get full text
Article