Results 11 to 20 of about 76,752 (276)
Here, we report a non-targeted analytical approach to investigate the influence of different starch sources on the metabolic signature in the final beer product. An extensive sample set of commercial beers brewed with barley, wheat, corn and/or rice were
Stefan A. Pieczonka +4 more
doaj +1 more source
Cryptocurrency as a New Financial and Legal Instrument: Defining Cryptoassets in Property Law [PDF]
The scientific research study is about the approach to crypto assets in property law. The cryptocurrency, possessing the signs of many civil rights, at the same time does not belong to any of them and does not correspond with anyone in a complete way ...
Astrakhantseva Irina +1 more
doaj +1 more source
The Legal Category of Authenticity. An Attempt at Definition
In law enforcement and in scientific research the category of authenticity is used both for theoretical conceptualization and in practical contexts.
O. A. Krestovnikov
doaj +1 more source
DESIGN AND LEGAL ASPECT OF CENTRAL BANK DIGITAL CURRENCY: A LITERATURE REVIEW
The development of digitalisation in the financial services sector has compelled Bank Indonesia to develop Central Bank Digital Currency (CBDC). CBDC as a new type of money requires adjustments in terms of applicable laws and regulations.
Fitri Handayani, Fatma Yuliana
doaj +1 more source
Dynamical and nonstandard computational analysis of heroin epidemic model
Numerical modelling of real-world problems has a significant role in different disciplines like biology, physics, chemistry, economics, and many more. The numerical results are the authentication of the results of the dynamical analysis.
Ali Raza +6 more
doaj +1 more source
How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core +2 more sources
Authentication with Distortion Criteria [PDF]
In a variety of applications, there is a need to authenticate content that has experienced legitimate editing in addition to potential tampering attacks.
Chen, Brian +2 more
core +2 more sources
Protection of personal data under martial law in Ukraine
The article is devoted to the issue of personal data protection under martial law in Ukraine. A detailed study of this issue has been carried out, aspects of the regulatory environment and levels of personal data protection in such difficult conditions ...
V. A. Svitlychnyi
doaj +1 more source
Verification of considered cause (ta’līl al-ahkām) together with the objectives of Shariah (maqāsid al-Sharī’ah) is among the most important issues discussed by the experts of Jurisprudence. This article analyses the procedures of establishing causes for
Zuhrotul Aini Mansur
doaj +1 more source
PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm [PDF]
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing.
A. Martínez-Nadal +7 more
core +2 more sources

