Results 91 to 100 of about 18,941 (248)
Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System
With the popularity of smart grids, plentiful of smart devices have been put into use, such as smart meters and power assets. Due to limited computation capabilities and storage spaces of these devices, the collected data need to be “outsourced ...
Mi Wen +4 more
doaj +1 more source
ABSTRACT This research explores the adaptive strategies employed by Conversas (Christian women of Jewish origin) and Moriscas (Christian women of Muslim origin) in navigating adversity, particularly in their interactions with inquisitorial authorities in the early modern Crown of Aragon. This study analyses these women's efforts to uphold religious and
Ivana Arsić
wiley +1 more source
‘Fine Men from Afar’: Cricket and Empire on the Home Front
Abstract During the Second World War, contrary to enduring images of bombardment and scarcity, people on Britain's ‘Home Front’ continued to take part in a broad array of sporting activities. Cricket played a more significant role in the wartime sporting landscape than many historians have previously recognized.
Michael Collins
wiley +1 more source
ABSTRACT Surgical menopause, the removal of both ovaries prior to natural menopause, may impact short‐and long‐term physical and emotional health. An increasingly common cause of surgical menopause is risk‐reducing salpingo‐oophorectomy (RRSO) in those at high inherited risk of ovarian cancer.
Sarah A. L. Price +12 more
wiley +1 more source
Misconduct complaints and agents’ incentives: Evidence from housing transactions
Abstract This article investigates the impact of misconduct complaints against agents on their self‐interested incentives and examines how agents attempt to shield themselves from the associated adverse effects on their reputations and career prospects.
Lawrence Kryzanowski, Yanting Wu
wiley +1 more source
k-times attribute-based authentication scheme using direct anonymous attestation
s: At present, the main drawbacks of existing k-times attribute-based authentication (abbreviated to k-TABA) schemes and related attribute-based authentication schemes are that the computation cost of the authentication process depends on the size of the
Xin LIU +3 more
doaj +2 more sources
The hidden discount: Examining racial disparity in the use of suspended sentences
Abstract Extant research on criminal sentencing generally concludes that racial/ethnic disparity is concentrated in the “in–out” decision, and that racial differences in sentence lengths are small and inconsistent. However, sentence length analyses rarely focus on the fact that criminal sentences are often partially or fully suspended, creating ...
Kevin Petersen +3 more
wiley +1 more source
Abstract Background and aims Drunk‐driving accounts for a significant portion of traffic crashes in Taiwan. From 2008 to 2013, both the Taiwan Legislative Yuan and the federal administrative agencies collaborated to increase drunk‐driving penalties.
Ling‐Wei Kuo +9 more
wiley +1 more source
Revocable Anonymous Credentials from Attribute-Based Encryption
We introduce a credential verification protocol leveraging on Ciphertext-Policy Attribute-Based Encryption. The protocol supports anonymous proof of predicates and revocation through accumulators.
openaire +1 more source
National identity after conquest
Abstract Conquering powers routinely adopt state‐directed nationalization projects that seek to make the boundaries of the nation coterminous with the (newly expanded) boundaries of the state. To this end, they implement policies that elevate the economic status of individuals who embrace the occupier's national identity and discriminate against those ...
Christopher Carter, Daniel W. Gingerich
wiley +1 more source

