Showing 8,901 - 8,920 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 8901

    Financialization, coalition of interests and interest rate in Brazil by Luiz Carlos Bresser-Pereira, Luiz Fernando de Paula, Miguel Bruno

    Published 2020-06-01
    “…Its aim is to maintain high real interest rates so as to gain from the resulting financialization process, fueled by interest revenues (ii) the existence of a “two-way“ public debt contagion effect between the banking reserves market and the public securities market; and (iii) the use of a high interest rate to finance current account deficits. …”
    Get full text
    Article
  2. 8902

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    “…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
    Get full text
    Article
  3. 8903

    A study on Pufferfish privacy algorithm based on Gaussian mixture models by Weisan Wu

    Published 2025-01-01
    “…This research not only enriches the privacy protection strategies for mixture models but also offers new insights into the secure handling of complex data.…”
    Get full text
    Article
  4. 8904

    Hydrogen Valleys – Energy transition and local development scenarios for medium-sized cities by Alessandra Battisti, Angela Calvano

    Published 2024-06-01
    “…The project of territorial heritage regeneration, reinterpreted by settled communities as a potential energy network, meets the needs of the New Deal by guaranteeing secure and equitable energy. The paper aims to understand how medium-sized cities can contribute to the experimentation of decision-making processes and hydrogen design solutions.   …”
    Get full text
    Article
  5. 8905

    L’économie politique de l’accès technique au marché : le cas du TAFTA by Benjamin Bürbaumer

    Published 2021-07-01
    “…It shows that technical market access talks constitute an institutionalized field of pre-market competition on which actors, situated at different spatial scales, rival in order to secure competitive advantage. The failure of the negotiations stems above all from each party’s attempt to unidirectionally extend its technical infrastructure to the other side of the Atlantic.…”
    Get full text
    Article
  6. 8906

    Opacity in Hedge Funds: Does it Create Value for Investors and Managers? by Flávia Januzzi, Aureliano Bressan, Fernando Moreira

    Published 2020-01-01
    “…We examine a unique and comprehensive database related to the positions in derivatives taken by managers, which was enabled due to specific disclosure regulatory demands of the Brazilian Securities Exchange Commission, where detailed information on hedge funds’ portfolio allocation should be provided on a monthly basis.…”
    Get full text
    Article
  7. 8907

    Amnion Epithelial Cells as a Candidate Therapy for Acute and Chronic Lung Injury by Ryan J. Hodges, Rebecca Lim, Graham Jenkin, Euan M. Wallace

    Published 2012-01-01
    “…It is amazing to suggest that the placenta may offer renewed life after birth as well as securing new life before.…”
    Get full text
    Article
  8. 8908

    PRECONDITIONS OF LAND RELATIONS DEVELOPMENT: ECONOMIC, LEGAL AND INSTITUTIONAL by Natalia Wasilewska, Tetiana Kaminska

    Published 2018-12-01
    “…The article also proposes mortgage refinancing mechanism through the issue of mortgage land securities.…”
    Get full text
    Article
  9. 8909

    Volatility dynamics of stock returns, liquidity and exchange rates in ASEAN Countries by David Umoru, Beauty Igbinovia, Emoabino Muhammed, Rashidat Inobemhe Ali

    Published 2025-01-01
    “…These includes the Singapore Exchange (SGX), Bursa Malaysia Stock Exchange (YSX), the Stock Exchange of Thailand (SET), Indonesia stock exchange, the Vietnam Stock Exchange (VNX), the Cambodia Securities Exchange (CSX), the Lao Securities Exchange (LSX), and the Philippine Stock Exchange. …”
    Get full text
    Article
  10. 8910

    Relations Between the Holy See and Lithuania: A 100-Year History by Haroldas Šinkūnas, Indrė Isokaitė-Valužė

    Published 2024-11-01
    “…Although the reestablishment of the independent State of Lithuania being based on the continuation of the State’s identity opened door for securing the validity of the Concordat concluded by the Holy See and the Republic of Lithuania in 1927, it was no longer capable of reflecting new realities, and new fundamental changes required the conclusion of new treaties between the parties. …”
    Get full text
    Article
  11. 8911

    Belonging to the Land in Tura: Reforms, Migrations, and Indentity Politics in Evenkia by Olga Povoroznyuk

    Published 2014-06-01
    “…In the long course of reforms and identity construction, the indigenous intelligentsia has manipulated the concept of belonging to the land either to stress or to erase cultural differences, and thus, to secure the access of the local elite to valuable resources. currently, the most hotly debated boundaries are those dividing Evenks into local and migrant, authentic and unauthentic, urban and rural. …”
    Get full text
    Article
  12. 8912

    L’acceptabilité sociale au bout de la transgression by Dominique Pécaud

    Published 2021-04-01
    “…Callon's presentation of a sociology of translation and the role that its methods could play in building a participatory project that makes social acceptability not a means to politically secure a project, but an end, that of the rationalization of the social that it mobilizes.…”
    Get full text
    Article
  13. 8913

    Improved Workload Distribution Scheme in Hybrid Cloud Setting by Ying Liu, Quan Gan, Yu Wang

    Published 2015-01-01
    “…An efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting was explored. …”
    Get full text
    Article
  14. 8914

    L’évaluation de la crise des subprimes et les limites du capitalisme spéculatif by Michel Van der Yeught

    Published 2015-03-01
    “…The analysis highlights that the subprime crisis resulted from the way the American securities markets are structured and that it was specifically the product of the stock market (as opposed to stock exchanges), its less regulated and most speculative part. …”
    Get full text
    Article
  15. 8915

    Symmetric Blind Decryption with Perfect Secrecy by Juha Partala

    Published 2017-01-01
    “…For noiseless channels, information-theoretically secure oblivious transfer is impossible. However, in this paper, we show that this is not the case for blind decryption. …”
    Get full text
    Article
  16. 8916

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “…Place documents in this case in a secure but easily accessed location in your home. …”
    Get full text
    Article
  17. 8917

    Book review: Residential child care: prospects and challenges Andrew Kendrick, Editor by Irene Stevens

    Published 2007-08-01
    “…Excellent evidence-based discussions on restraint, peer violence and the use of secure accommodation are generally lacking in this area which is often, ironically, one where practitioners and policy makers seek most guidance. …”
    Article
  18. 8918

    Disaster Planning: Important Papers and Documents by Josephine Turner

    Published 2003-06-01
    “…Place documents in this case in a secure but easily accessed location in your home. …”
    Get full text
    Article
  19. 8919

    Conflicts between People and the Florida Black Bear by Elizabeth F. Pienaar

    Published 2014-10-01
    “…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
    Get full text
    Article
  20. 8920

    Conflicts between People and the Florida Black Bear by Elizabeth F. Pienaar

    Published 2014-10-01
    “…Conflicts between people and black bears arise when people fail to remove or secure potential food sources. In their search for food, black bears may damage property and threaten, injure, or kill pets and livestock in order to gain access to their feed. …”
    Get full text
    Article