Results 131 to 140 of about 18,941 (248)
Abstract Using the amnesty introduced by the Boris Johnson government designed to protect British army veterans who served in Northern Ireland as a case study, this article examines the intersection between law, politics and the legacy of conflict. The article first offers an account of the amnesty's genesis and traces the evolution and deployment of ...
KIERAN MCEVOY
wiley +1 more source
Secure data sharing architecture for industrial Internet of things based on dual consortium chains
Frequent data interaction and sharing were identified as typical characteristics of the Industrial Internet of Things (IIoT). Ciphertext-Policy Attribute-Based Encryption (CP-ABE) was recognized as providing a secure foundation for data interaction and ...
LI Xiaowei +5 more
doaj
Abstract This article examines how and to what extent violence has become a pivotal tool for conducting business in places integrated into the global value chain. It also explores the roles stakeholders play in silencing workers' resistance within these places.
Shoaib Ahmed
wiley +1 more source
Secure electronic health record access control via blockchain, dual-attribute encryption, and large language model-based attribute extraction. [PDF]
Nekouie A +3 more
europepmc +1 more source
Counter‐Stigmatization in the Digital Age: The Case of the Sex Tech Award Incident
Abstract Scholars have shown considerable interest in how organizations manage stigma when powerful actors discredit them and their products. However, research has paid less attention to how organizations might deflect stigma back onto their stigmatizers.
Neva Bojovic +2 more
wiley +1 more source
Advances and Future Directions in Information Security and Data Privacy. [PDF]
Alishahi M.
europepmc +1 more source
Psychophysical changes after total sleep deprivation and experimental muscle pain
Summary Sleep disturbances exacerbate chronic pain, increase psychological load, and increase inflammation. Delayed onset muscle soreness (DOMS) mimics aspects of chronic pain, predominantly affecting peripheral pain mechanisms, while experimental sleep provocations have been shown to impact central pain mechanisms.
Emma Hertel +5 more
wiley +1 more source
An efficient lattice-based integrated revocable identity-based encryption. [PDF]
Huang H, Li J, Bi S, Yuan Q.
europepmc +1 more source
Monitoring panels of sparse functional data
Panels of random functions are common in applications of functional data analysis. They often occur when sequences of functions are observed at a number of different locations. We propose a methodology to monitor for structural breaks in such panels and to identify the changing components with statistical certainty.
Tim Kutta +2 more
wiley +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source

