Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
9181
Comparison of Bureaucratic Neutrality in the 2019 and 2024 Elections From The Perspective of Online Mass Media in Achieving SDG 16 (Peace, Justice, and Strong Institutions)
Published 2025-01-01“…Meanwhile, in 2019, the dominance of content is a commitment to neutrality, securing elections, the threat of hoaxes and cyber, and the potential for election vulnerability.…”
Get full text
Article -
9182
Brand Image as a Strategic Lever for Mergers and Acquisitions in the Financial Services Sector in South Africa
Published 2024-10-01“…Companies in a M&A are in most instances preoccupied in pursuit of increasing the shareholder value and securing the biggest market share through effective branding. …”
Get full text
Article -
9183
Assessment of Records Management Practices at Uganda College of Commerce Kabale.
Published 2024“…Proposed solutions included ensuring retention and durability, providing secure storage, offering continuous training programs, acknowledging the diversity of paper and electronic records, maintaining authenticity, proper disposal, and utilizing computer-based management practices. …”
Get full text
Thesis -
9184
An access control scheme for IoT based on smart contracts and CP-ABE
Published 2024-10-01“…Simulation experiments and performance analysis demonstrate that compared to existing solutions, this approach enables data owners to securely authorize access for a large number of requesting subjects in a shorter time frame. …”
Get full text
Article -
9185
Fatigue crack paths under the influence of changes in stiffness
Published 2015-12-01“…Regions with differing stiffness also arise from ribs, grooves or boreholes. Since secure findings on the propagation behaviour of fatigue cracks are essential for the evaluation of the safety of components and structures, the growth of cracks near changes in stiffness has to be considered, too. …”
Get full text
Article -
9186
The effectiveness of coercive measures in motivating vaccination: Evidence from China during the COVID-19 pandemic
Published 2025-12-01“…Governments worldwide have implemented mandates, restrictions, and other coercive measures to secure adequate vaccine coverage, with the COVID-19 pandemic providing numerous examples. …”
Get full text
Article -
9187
Research on Multiparty Payment Technology Based on Blockchain and Smart Contract Mechanism
Published 2022-01-01“…The payment channel network is the most promising solution to expand the blockchain for widespread use. Achieving secure instant payment on the payment channel can significantly increase transaction throughput and reduce transaction delays. …”
Get full text
Article -
9188
The Evolution of Venezuelan Evangelical Involvement in Politics: The Case of the 2024 Presidential Elections
Published 2025-01-01“…After his questionable re-election in 2018, Venezuelan President Nicolás Maduro Moros (NMM) began a campaign to attract the attention of evangelical leaders, apostles, prophets, pastors, and church members to secure their votes for the 2024 campaign. The main reason for this move was the surprising growth of the evangelical population in the country, which reached almost 30% by the end of 2023. …”
Get full text
Article -
9189
Understanding Professional Discretion by Principals in Managing Drugs in Gauteng Province schools in South Africa
Published 2024-12-01“…School principals are responsible for maintaining a safe, secure and orderly school environment. A qualitative research design was employed to collect data from secondary school principals in quintiles 1 to 3 (disadvantaged schools) in the Gauteng Province of South Africa. …”
Get full text
Article -
9190
Robert Duncan, Kabbalah, and “The Dominion of the Poetic Mind”
Published 2020-12-01“…Situating Duncan as the heir to nineteenth-century occult organizations and the rethinking of hermetic traditions in groups such as the Order of the Golden Dawn, I then proceed to a brief reading of his poem “Roots and Branches,” in order to demonstrate how Duncan’s kabbalistic vision of the “imaginary tree of the living in all its doctrines” awakens “transports of an inner view of things,” and secures the poetic imagination as the supreme vehicle of mystical experience.…”
Get full text
Article -
9191
Education as Performative Contradiction: Limits (And Possibilities) of Subjectification in the Anthropocene
Published 2025-01-01“…As observed by Gough (2021), a general belief shared among both policy makers and academics is a consensus that education needs to be perceived less as an instrument for securing sociocultural reproduction and transmission of existing knowledge and more as a catalyst for social and cultural change. …”
Get full text
Article -
9192
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01“…Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is currently facing an important challenge.Through research,it has been found that some attribute-level user revocation schemes currently can’t resist the collusion attack between the revoked user and the existing user.To solve this problem,an attribute-based encryption scheme that supported the immediate attribute revocation was proposed.The scheme could achieve attribute-level user revocation and could effectively resist collusion attacks between the revoked users and the existing users.At the same time,this scheme outsourced complex decryption calculations to cloud service providers with powerful computing ability,which reduced the computational burden of the data user.The scheme was proved secure based on computational Diffie-Hellman assumption in the standard model.Finally,the functionality and efficiency of the proposed scheme were analyzed and verified.The experimental results show that the proposed scheme can safely implement attribute-level user revocation and has the ability to quickly decrypt,which greatly improves the system efficiency.…”
Get full text
Article -
9193
MSK Ultrasound - An IJSPT Perspective
Published 2023-02-01“…MSK ultrasound effectively streamlines the process by enabling practitioners to securely and accurately image and assess structures all in one simple step. …”
Get full text
Article -
9194
Integration Dilemma within the Eurasian Space in the Context of the Ukrainian Crisis
Published 2015-06-01“…In the current situation for Belarus and Kazakhstan as two , along with Russia , the main designers of the Eurasian field, the dilemma of integration takes a fundamentally different meaning and becomes a so-called "Dilemma of integrations", or contradiction between the desire of these countries to secure the most favorable conditions in its relations with Moscow and reluctance to fully bear the burden of the costs and constraints arising in relations with the EU due to the commitments of the EAEC. …”
Get full text
Article -
9195
Yield to maturity determinants in Indonesia corporate bonds with leverage as moderating variable
Published 2023-06-01“…The capital market is a forum for companies to sell shares and bonds in the hope of obtaining additional funds raised from the proceeds of selling part ownership of the company or issuing debt securities. The long-term market or commonly called the capital market has a variety of instruments that can be considered for investors. …”
Get full text
Article -
9196
Tonalität als geschichtliches System. ›Dogmatische Denkform‹ und historischer Nachweis
Published 2016-01-01“…Understanding a system and understanding a historical development call for different strategies of perception and methods of securing scientificity. The tension between these two strategies has a subliminal influence on the nature of Dahlhaus’s Studies on the Origin of Harmonic Tonality since the author succeeds – for the most part subtly – in concealing this tension but ultimately fails to resolve it.…”
Get full text
Article -
9197
The potential for justice through tourism
Published 2018-09-01“…This article considers the potential for tourism to contribute to efforts to secure justice. It reviews the evolution of tourism from a respected tool for personal development and social transformation to its now industrialised form under neoliberalism where its value is estimated in terms of employment and income. …”
Get full text
Article -
9198
Synchronization in Finite Time of Fuzzy Neural Networks with Hybrid Delays and Uncertain Nonlinear Perturbations
Published 2022-01-01“…Finally, the validity of our proposed results is confirmed by several examples and simulations. Furthermore, a secure communication problem is presented to further illustrate the fact of the obtained results.…”
Get full text
Article -
9199
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01“…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
Get full text
Article -
9200
Research on the design and application of role-resource based access control model
Published 2024-11-01“…Future research can further optimize the R-RBAC model and explore its applications in other domains to achieve more efficient and secure permission management.…”
Get full text
Article