Results 1 to 10 of about 4,209 (267)

Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

open access: yesEmitter: International Journal of Engineering Technology, 2016
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile,
Samsul Huda   +2 more
doaj   +1 more source

GLOBAL RESEARCH TRENDS IN BLOCKCHAIN IN SMART GRID: A TEXT MINING BASED SCIENTOMETRIC STUDY [PDF]

open access: yesProceedings on Engineering Sciences
Purpose - This paper analyze the trends on “Blockchain in Power Grid” in national and international research by bibliometric analysis. The bibliometric review of this study helps scientist/researchers to explore the trends in “Blockchain in Power Grid ...
Reetu Verma, Nidhi Gupta, Suman Mann
doaj   +1 more source

MULTILINGUALISM IN EU LAW: HOW PROMULGATION AUTHENTICATES EQUALITY

open access: yesComparative Legilinguistics, 2010
EU law currently applies to 27 countries and is available in 23 languages which all carry equal status. In practice, this is achieved though translation and by the work of the DGT (Directorate General Translation), which hosts the largest translation service in the world. But from a legal point of view, translation is institutionally ‘non-existent’ and
openaire   +2 more sources

Position and enforcement practice of the People's Republic of China's pharmaceutical data exclusivity protection

open access: yesDrug Design, Development and Therapy, 2016
Na Li,1 Xiang Yu,2 Michael Pecht3 1School of Law, Ningbo University, Ningbo, People’s Republic of China; 2School of Law and Politics, Ningbo Institute of Technology, Zhejiang University, Ningbo, People’s Republic of China; 3Center for ...
Li N, Yu X, Pecht M
doaj  

Using pH Value as a Discriminating Feature for Scotch Whisky Authentication in Taiwan

open access: yesChemosensors
While pH possesses inherent chemical significance and potential forensic value in Scotch whisky authentication, it has previously lacked a statistically rigorous exclusionary standard.
Ting-Chia Chang   +3 more
doaj   +1 more source

Los datos biométricos y las tecnologías que los utilizan para su funcionamiento: Régimen jurídico aplicable y potenciales riesgos

open access: yesRevista Vasca de Administración Pública
The use and implementation of disruptive technologies poses numerous challenges to be faced by the law. Biometric-based systems use personal data for their operation as they collect intrinsic and unalterable aspects of individuals to generate a biometric
Diana Paola González Mendoza
doaj   +1 more source

Information Technology Act 2000 in India - Authentication of E-Documents

open access: yesJournal of Digital Forensics, Security and Law, 2007
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially ...
R. G. Pawar, B. S. Sawant, A. Kaiwade
doaj  

A Blockchain-Based Framework for OSINT Evidence Collection and Identification

open access: yesFuture Internet
The rapid advancement of social media and the exponential increase in online information have made open-source intelligence an essential component of modern criminal investigations.
Han-Wen Huang   +3 more
doaj   +1 more source

Rad concept: authentic evidence women's specialties in Islamic heritage law

open access: yesUlul Albab: Jurnal Studi dan Penelitian Hukum Islam, 2020
Basically, Islam is a religion explains existence of equivalents and parallelization between man and woman which placed woman in a fair position to get her rights in social, economy, politic, and Islamic inheritance law. This study aims to answer gender bias in the manner of describing woman uniqueness in rad concept by Islamic inheritance law.
openaire   +3 more sources

Nikāh in the Digital Age: Evaluation of Video Online Marriage Contracts in terms of Islamic Law

open access: yesDiyanet İlmi Dergi
In recent years, rapid digitalization, along with transformations in communication technologies and legal systems, has profoundly altered traditional practices.
Hasan Demir
doaj   +1 more source

Home - About - Disclaimer - Privacy