-
1
Why Did I Lose My Seat in the United States Congressional Elections? You Didn‘t Advertise Online Enough!
Published 2024-04-01Get full text
Article -
2
Verifiable three-party secure key exchange protocol based on eigenvalue
Published 2019-12-01“…In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However,the validity of key exchange cannot be verified by the scheme,and counterfeiting by middlemen can’t be prevented.Then based on it,the secret matrix was reconstructed,where the matrix order was a large even number,and all the eigenvalues appeared in pairs,similar to the diagonal matrix.Based on the special secret matrix,the verification part which can be used to verify the legitimacy of the communication party was introduced to the scheme,and the verifiable three-party key exchange protocol based on the eigenvalue was given.The protocol not only solved the problem of three-party key exchange,but also verified identity legitimacy.It is proved that it’s feasible to design a three-party key exchange protocol by the eigenvalue.The final protocol is both secure and efficient.…”
Get full text
Article -
3
The position of Lithuanian parties towards Poland in 1920-1926: from modus vivendi to permanent confrontation
Published 2008-08-01“…However, the attitude of the Christian Democrats that it was possible to launch economic relationships with Poland, and the Social Democrats' belief that it was even crucial to do so, which were regarded as a first step in resuming Vilnius, in fact reflected that the leaders of the parties had enough rational reasoning as well as a mature attitude to international relations. …”
Get full text
Article -
4
Why Is Participation Low in Referendums? Lessons from Latin America
Get full text
Article -
5
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01“…A flaw lied in the security definition of the Bellare-Rogaway 3PKD model,which was proposed by Bellare and Rogaway for three-party key distribution in 1995,was discovered.To reveal it,a new three-party key distribution proto-col P-Flaw was proposed.The protocol was provably secure under the Bellare-Rogaway 3PKD model.However the pro-tocol was not secure enough to withstand the server spoofing attack,known session key attack,and replay attack.The absence of the origin recognition for the distributed session key accounts for the flaw.Accordingly,the security definition of the Bellare-Rogaway 3PKD model was corrected based on matching conversation.…”
Get full text
Article -
6
REJECTION OF DOGMA
Published 1998-01-01“…Later on, his ability to question everything what was officially accepted in the Marxist theory has formed a gighly original school of the University philosophers, which attracted strong enough criticism of official institutions, but made a great impact on academic youth. …”
Get full text
Article -
7
REJECTION OF DOGMA
Published 1998-01-01“…Later on, his ability to question everything what was officially accepted in the Marxist theory has formed a gighly original school of the University philosophers, which attracted strong enough criticism of official institutions, but made a great impact on academic youth. …”
Get full text
Article -
8
Research on SaaS Support Architecture and Key Technologies
Published 2013-12-01“…There are some problems about SaaS supported by the popular PaaS and IaaS: customizing SaaS is commonly not done deeply without semantic association; sources are wasted when SaaS applications are scaled by VM and whole application unit; SaaS applications developed by the 3rd party software vendors are not enough supported in multi-tenancy. …”
Get full text
Article -
9
Conception on the Teaching of "Rehabilitation Pharmacology" based on Rehabilitation Pharmacy Services in Rehabilitation Majors
Published 2023-12-01“…The report of the 20th National Congress of the Communist Party of China clearly stated that to "promote the construction of a healthy China",it is necessary to accurately match the needs and expectations of the people who pay more attention to the quality of life ,health and safety. …”
Get full text
Article -
10
Optimal Decision and Coordination of Fresh E-Commerce Supply Chain Considering Double Loss
Published 2022-01-01“…But, if fresh-keeping cost is within a certain range and the basic quantity loss rate is high enough, the online retailer prefers price reduction strategies. …”
Get full text
Article -
11
E-Commerce across Boarder Logistics Risk Evaluation Model Based on Improved Neural Network
Published 2022-01-01“…The key information in BP neural network algorithm is stored in weights and thresholds, which is enough to prove the importance of weights and thresholds for the effective operation of the whole network. …”
Get full text
Article -
12
Reflections on Korea in 2010: Trials and prospects for recovery of common sense in 2011
Published 2011-01-01“…Perhaps it feels that way because the final weeks since the shelling of Yeongpyeong Island on the West Sea of the Korean peninsula on November 23 have been filled with events that evoke grief, anger, and anxiety.As for the Yeongpyeong incident itself, whatever its cause or justification, the fact that North Korea deliberately opened fire on South Korean territory is enough to bring shock and anger. To make matters worse, the incompetence and sloppiness of the South Korean government in its initial response caused uneasiness among the citizens, and its belated displays of toughness and escalation of tension, proclaiming "readiness for a full-scale war," has added to South Korean people's sense of insecurity and even stirred their anger.Taking advantage of the security crisis, members of the ruling Grand National Party (GNP) on December 8 unilaterally and employing physical force rammed through the National Assembly the annual budget and other disputed bills. …”
Get full text
Article -
13
Russia and Poland: Problems of Inevitable Coexistence
Published 2014-12-01“…But innovations appear in multilateral and conflict enough issues, such as deployment of US missile defense system in Poland or Polish supervision of "Eastern Partnership" programme. …”
Get full text
Article -
14
APPOINTMENT OF HANDWRITING EXAMINATION: ANALYSIS OF COURT PRACTICE
Published 2022-12-01“…Based on the results of the analysis of court practice, the authors made conclusions, including: 1) an expert's decision is evidence in a civil trial; 2) the court must provide a well-founded motivation for rejecting the expert's decision in the case of failure to provide its assessment, because it is not enough in the decision to indicate certain doubts about the reliability or correctness of the expert's decision, without noting at the same time reasonable grounds for such doubts; 3) the courts take into account the expert's decision based on the results of the handwriting examination as a means of proof and consider it a valid evidence in the case, but there are exceptions; 4) the court decision on the appointment of an expert must necessarily specify the questions that are put to the expert for research; 5) the party in the case has the right to object to the handwriting examination; 6) there are cases of the impossibility of conducting a handwriting examination at the stage of its conduct due to non-payment of experts' services; 7) the most common civil cases, within the scope of which an expert's decision is evaluated as a means of proof, are cases of invalidating a will, collection of funds under a loan agreement and receipt, invalidation of land lease agreements, etc.…”
Get full text
Article -
15
Using network partnerships in management consulting
Published 2022-07-01“…As a rule, they do not have enough money for their services, and large consulting firms themselves choose mainly large clients to work with.…”
Get full text
Article -
16
POLITIK ISLAM MAHATHIR MOHAMMAD DI MALAYSIA DAN SOEHARTO DI INDONESIA
Published 2018-06-01“…Mahathir consisted to give enough spaces for competition, Suharto did not want to compromise. …”
Get full text
Article -
17
La poésie lyrique, un outil d’unification linguistique et politique
Published 2023-12-01“…Agrippa d’Aubigné, as a protestant poet, appreciate the poem enough to recommend it to everybody – lyric poetry rising above religious opinion. …”
Get full text
Article -
18
Application of Cart Method in Analyzing Factors Affecting Nutritional Status of Children Aged 6-23 Months
Published 2023-09-01“…Therefore, intervention from related parties is needed to implement programs for improving mother's knowledge about nutrition that will lead to better child’s nutritional status. …”
Get full text
Article -
19
Application of Cart Method in Analyzing Factors Affecting Nutritional Status of Children Aged 6-23 Months
Published 2023-09-01“…Therefore, intervention from related parties is needed to implement programs for improving mother's knowledge about nutrition that will lead to better child’s nutritional status. …”
Get full text
Article -
20
“What Scares Me Is the Speed at Which Artificial Intelligence Is Developing”: Students' Perceptions of Artificial Intelligence in Foreign Language Teaching
Published 2024-05-01“…As a result of the study, we came to the conclusion that at the moment AI tools are not widespread enough in teaching foreign languages. Only one-fifth of the respondents use these tools, but the respondents’ comments suggest that the number of users will grow. …”
Get full text
Article