Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8901
Financialization, coalition of interests and interest rate in Brazil
Published 2020-06-01“…Its aim is to maintain high real interest rates so as to gain from the resulting financialization process, fueled by interest revenues (ii) the existence of a “two-way“ public debt contagion effect between the banking reserves market and the public securities market; and (iii) the use of a high interest rate to finance current account deficits. …”
Get full text
Article -
8902
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01“…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
Get full text
Article -
8903
A study on Pufferfish privacy algorithm based on Gaussian mixture models
Published 2025-01-01“…This research not only enriches the privacy protection strategies for mixture models but also offers new insights into the secure handling of complex data.…”
Get full text
Article -
8904
Hydrogen Valleys – Energy transition and local development scenarios for medium-sized cities
Published 2024-06-01“…The project of territorial heritage regeneration, reinterpreted by settled communities as a potential energy network, meets the needs of the New Deal by guaranteeing secure and equitable energy. The paper aims to understand how medium-sized cities can contribute to the experimentation of decision-making processes and hydrogen design solutions. …”
Get full text
Article -
8905
L’économie politique de l’accès technique au marché : le cas du TAFTA
Published 2021-07-01“…It shows that technical market access talks constitute an institutionalized field of pre-market competition on which actors, situated at different spatial scales, rival in order to secure competitive advantage. The failure of the negotiations stems above all from each party’s attempt to unidirectionally extend its technical infrastructure to the other side of the Atlantic.…”
Get full text
Article -
8906
Opacity in Hedge Funds: Does it Create Value for Investors and Managers?
Published 2020-01-01“…We examine a unique and comprehensive database related to the positions in derivatives taken by managers, which was enabled due to specific disclosure regulatory demands of the Brazilian Securities Exchange Commission, where detailed information on hedge funds’ portfolio allocation should be provided on a monthly basis.…”
Get full text
Article -
8907
Amnion Epithelial Cells as a Candidate Therapy for Acute and Chronic Lung Injury
Published 2012-01-01“…It is amazing to suggest that the placenta may offer renewed life after birth as well as securing new life before.…”
Get full text
Article -
8908
PRECONDITIONS OF LAND RELATIONS DEVELOPMENT: ECONOMIC, LEGAL AND INSTITUTIONAL
Published 2018-12-01“…The article also proposes mortgage refinancing mechanism through the issue of mortgage land securities.…”
Get full text
Article -
8909
Volatility dynamics of stock returns, liquidity and exchange rates in ASEAN Countries
Published 2025-01-01“…These includes the Singapore Exchange (SGX), Bursa Malaysia Stock Exchange (YSX), the Stock Exchange of Thailand (SET), Indonesia stock exchange, the Vietnam Stock Exchange (VNX), the Cambodia Securities Exchange (CSX), the Lao Securities Exchange (LSX), and the Philippine Stock Exchange. …”
Get full text
Article -
8910
Relations Between the Holy See and Lithuania: A 100-Year History
Published 2024-11-01“…Although the reestablishment of the independent State of Lithuania being based on the continuation of the State’s identity opened door for securing the validity of the Concordat concluded by the Holy See and the Republic of Lithuania in 1927, it was no longer capable of reflecting new realities, and new fundamental changes required the conclusion of new treaties between the parties. …”
Get full text
Article -
8911
Belonging to the Land in Tura: Reforms, Migrations, and Indentity Politics in Evenkia
Published 2014-06-01“…In the long course of reforms and identity construction, the indigenous intelligentsia has manipulated the concept of belonging to the land either to stress or to erase cultural differences, and thus, to secure the access of the local elite to valuable resources. currently, the most hotly debated boundaries are those dividing Evenks into local and migrant, authentic and unauthentic, urban and rural. …”
Get full text
Article -
8912
L’acceptabilité sociale au bout de la transgression
Published 2021-04-01“…Callon's presentation of a sociology of translation and the role that its methods could play in building a participatory project that makes social acceptability not a means to politically secure a project, but an end, that of the rationalization of the social that it mobilizes.…”
Get full text
Article -
8913
Improved Workload Distribution Scheme in Hybrid Cloud Setting
Published 2015-01-01“…An efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting was explored. …”
Get full text
Article -
8914
L’évaluation de la crise des subprimes et les limites du capitalisme spéculatif
Published 2015-03-01“…The analysis highlights that the subprime crisis resulted from the way the American securities markets are structured and that it was specifically the product of the stock market (as opposed to stock exchanges), its less regulated and most speculative part. …”
Get full text
Article -
8915
Symmetric Blind Decryption with Perfect Secrecy
Published 2017-01-01“…For noiseless channels, information-theoretically secure oblivious transfer is impossible. However, in this paper, we show that this is not the case for blind decryption. …”
Get full text
Article -
8916
Disaster Planning: Important Papers and Documents
Published 2003-06-01“…Place documents in this case in a secure but easily accessed location in your home. …”
Get full text
Article -
8917
Book review: Residential child care: prospects and challenges Andrew Kendrick, Editor
Published 2007-08-01“…Excellent evidence-based discussions on restraint, peer violence and the use of secure accommodation are generally lacking in this area which is often, ironically, one where practitioners and policy makers seek most guidance. …”
Article -
8918
Disaster Planning: Important Papers and Documents
Published 2003-06-01“…Place documents in this case in a secure but easily accessed location in your home. …”
Get full text
Article -
8919
Conflicts between People and the Florida Black Bear
Published 2014-10-01“…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
Get full text
Article -
8920
Conflicts between People and the Florida Black Bear
Published 2014-10-01“…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
Get full text
Article