Blockchain-driven smart contract with key exchange protocol for secure device-to-device communication using verkle tree K-ary structures. [PDF]
Simbu A, Nandakumar S, Saravanan K.
europepmc +1 more source
Unpacking Welfare Deservingness Theory: Evidence From the Perceived Deservingness of Gig Workers
ABSTRACT The theory of welfare deservingness provides valuable insights into the social legitimacy of welfare programs and the principles underlying policy design. In examining the question of who deserves what and why, established deservingness criteria emphasize that individuals demonstrating motivation to work (“reciprocity”) are typically perceived
Juhyun Bae
wiley +1 more source
A machine learning based authentication and intrusion detection scheme for IoT users anonymity preservation in fog environment. [PDF]
Oliullah K +4 more
europepmc +1 more source
ABSTRACT Attracting talent to public administration is a highly relevant issue of practical concern and scholarly debate. Building on unique survey data of 424 individuals who switched jobs to join public administration, this study explores public employer attractiveness in a multi‐incentive setting, accounting for the experiences of a less explored ...
Adrian Ritz +3 more
wiley +1 more source
The Governor's Dilemma and Regime Complexity: Diversification and Differentiation
ABSTRACT States, firms, and other types of governors routinely rely on intermediaries to govern issues on their behalf. Such indirect governance drives regime complexity: governors frequently enlist multiple intermediaries for governing an issue. I theorize that governors foster complexity to maximize utility from indirect governance.
David Hagebölling
wiley +1 more source
A Survey of Clinicians in US Healthcare Delivery Organizations on Mobile Device Use in Care Delivery. [PDF]
Gellert GA +3 more
europepmc +1 more source
From Everyman to Hamlet: A Distant Reading
Abstract The sixteenth century sees English drama move from Everyman to Hamlet: from religious to secular subject matter and from personified abstractions to characters bearing proper names. Most modern scholarship has explained this transformation in terms originating in the work of Jacob Burckhardt: concern with religion and a taste for ...
Vladimir Brljak
wiley +1 more source
A cooperative ECC-based authentication protocol for VANETs. [PDF]
Liu Z, Yao N, Bai S, Mai T.
europepmc +1 more source
Accountability in the Delivery of Guaranteed Employment Through MGNREGA in Rural India
ABSTRACT We use the uneven rollout of accountability measures to identify their impact on the provision of guaranteed employment in rural Andhra Pradesh and Telangana, India. A public information campaign combined with an NGO‐supported grievance mechanism resulted in treated households working over 10 additional days per year in the program. We find no
Tara Bedi, Lukas Kuld
wiley +1 more source
Physically secure and fog-enabled lightweight authentication scheme for WBAN. [PDF]
Subramani J +3 more
europepmc +1 more source

