Results 11 to 20 of about 76,752 (276)

On the Trail of the German Purity Law: Distinguishing the Metabolic Signatures of Wheat, Corn and Rice in Beer

open access: yesFrontiers in Chemistry, 2021
Here, we report a non-targeted analytical approach to investigate the influence of different starch sources on the metabolic signature in the final beer product. An extensive sample set of commercial beers brewed with barley, wheat, corn and/or rice were
Stefan A. Pieczonka   +4 more
doaj   +1 more source

Cryptocurrency as a New Financial and Legal Instrument: Defining Cryptoassets in Property Law [PDF]

open access: yesSHS Web of Conferences, 2021
The scientific research study is about the approach to crypto assets in property law. The cryptocurrency, possessing the signs of many civil rights, at the same time does not belong to any of them and does not correspond with anyone in a complete way ...
Astrakhantseva Irina   +1 more
doaj   +1 more source

The Legal Category of Authenticity. An Attempt at Definition

open access: yesТеория и практика судебной экспертизы, 2017
In law enforcement and in scientific research the category of authenticity is used both for theoretical conceptualization and in practical contexts.
O. A. Krestovnikov
doaj   +1 more source

DESIGN AND LEGAL ASPECT OF CENTRAL BANK DIGITAL CURRENCY: A LITERATURE REVIEW

open access: yesJournal of Central Banking Law and Institutions, 2022
The development of digitalisation in the financial services sector has compelled Bank Indonesia to develop Central Bank Digital Currency (CBDC). CBDC as a new type of money requires adjustments in terms of applicable laws and regulations.
Fitri Handayani, Fatma Yuliana
doaj   +1 more source

Dynamical and nonstandard computational analysis of heroin epidemic model

open access: yesResults in Physics, 2022
Numerical modelling of real-world problems has a significant role in different disciplines like biology, physics, chemistry, economics, and many more. The numerical results are the authentication of the results of the dynamical analysis.
Ali Raza   +6 more
doaj   +1 more source

How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]

open access: yes, 2005
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core   +2 more sources

Authentication with Distortion Criteria [PDF]

open access: yes, 2005
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks.
Chen, Brian   +2 more
core   +2 more sources

Protection of personal data under martial law in Ukraine

open access: yesLaw and Safety, 2023
The article is devoted to the issue of personal data protection under martial law in Ukraine. A detailed study of this issue has been carried out, aspects of the regulatory environment and levels of personal data protection in such difficult conditions ...
V. A. Svitlychnyi
doaj   +1 more source

Verivication of Considered Cause (Ta'lil al-Ahkam) in Worships from I'lam al-Muwaqi'in | تعليل الأحكام في العبادات من إعلام الموقعين

open access: yesAl-Zahra: Journal for Islamic and Arabic Studies, 2018
Verification of considered cause (ta’līl al-ahkām) together with the objectives of Shariah (maqāsid al-Sharī’ah) is among the most important issues discussed by the experts of Jurisprudence. This article analyses the procedures of establishing causes for
Zuhrotul Aini Mansur
doaj   +1 more source

PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]

open access: yes, 2013
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal   +7 more
core   +2 more sources

Home - About - Disclaimer - Privacy