Results 91 to 100 of about 18,941 (248)

Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System

open access: yesIEEE Access, 2019
With the popularity of smart grids, plentiful of smart devices have been put into use, such as smart meters and power assets. Due to limited computation capabilities and storage spaces of these devices, the collected data need to be “outsourced ...
Mi Wen   +4 more
doaj   +1 more source

In Defence of Food: A Comparative Study of Conversas' and Moriscas' Dietary Laws as a Form of Cultural Resistance in the Early Modern Crown of Aragon

open access: yesGender &History, EarlyView.
ABSTRACT This research explores the adaptive strategies employed by Conversas (Christian women of Jewish origin) and Moriscas (Christian women of Muslim origin) in navigating adversity, particularly in their interactions with inquisitorial authorities in the early modern Crown of Aragon. This study analyses these women's efforts to uphold religious and
Ivana Arsić
wiley   +1 more source

‘Fine Men from Afar’: Cricket and Empire on the Home Front

open access: yesHistory, EarlyView.
Abstract During the Second World War, contrary to enduring images of bombardment and scarcity, people on Britain's ‘Home Front’ continued to take part in a broad array of sporting activities. Cricket played a more significant role in the wartime sporting landscape than many historians have previously recognized.
Michael Collins
wiley   +1 more source

What Happens After Menopause (WHAM)? A Progress Report of a Prospective Controlled Study of Women After Pre‐Menopausal Risk‐Reducing Bilateral Salpingo‐Oophorectomy

open access: yesBJOG: An International Journal of Obstetrics &Gynaecology, EarlyView.
ABSTRACT Surgical menopause, the removal of both ovaries prior to natural menopause, may impact short‐and long‐term physical and emotional health. An increasingly common cause of surgical menopause is risk‐reducing salpingo‐oophorectomy (RRSO) in those at high inherited risk of ovarian cancer.
Sarah A. L. Price   +12 more
wiley   +1 more source

Misconduct complaints and agents’ incentives: Evidence from housing transactions

open access: yesReal Estate Economics, EarlyView.
Abstract This article investigates the impact of misconduct complaints against agents on their self‐interested incentives and examines how agents attempt to shield themselves from the associated adverse effects on their reputations and career prospects.
Lawrence Kryzanowski, Yanting Wu
wiley   +1 more source

k-times attribute-based authentication scheme using direct anonymous attestation

open access: yesTongxin xuebao, 2018
s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the
Xin LIU   +3 more
doaj   +2 more sources

The hidden discount: Examining racial disparity in the use of suspended sentences

open access: yesCriminology, EarlyView.
Abstract Extant research on criminal sentencing generally concludes that racial/ethnic disparity is concentrated in the “in–out” decision, and that racial differences in sentence lengths are small and inconsistent. However, sentence length analyses rarely focus on the fact that criminal sentences are often partially or fully suspended, creating ...
Kevin Petersen   +3 more
wiley   +1 more source

The correlation between sanction adjustments and drunk‐driving violations and related outcomes in Taiwan: A nationwide interrupted time series analysis

open access: yesAddiction, EarlyView.
Abstract Background and aims Drunk‐driving accounts for a significant portion of traffic crashes in Taiwan. From 2008 to 2013, both the Taiwan Legislative Yuan and the federal administrative agencies collaborated to increase drunk‐driving penalties.
Ling‐Wei Kuo   +9 more
wiley   +1 more source

Revocable Anonymous Credentials from Attribute-Based Encryption

open access: yes, 2023
We introduce a credential verification protocol leveraging on Ciphertext-Policy Attribute-Based Encryption. The protocol supports anonymous proof of predicates and revocation through accumulators.
openaire   +1 more source

National identity after conquest

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Conquering powers routinely adopt state‐directed nationalization projects that seek to make the boundaries of the nation coterminous with the (newly expanded) boundaries of the state. To this end, they implement policies that elevate the economic status of individuals who embrace the occupier's national identity and discriminate against those ...
Christopher Carter, Daniel W. Gingerich
wiley   +1 more source

Home - About - Disclaimer - Privacy