Results 41 to 50 of about 93,599 (182)

Stronger Security Variants of GCM-SIV

open access: yesIACR Transactions on Symmetric Cryptology, 2016
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj   +1 more source

‘Vitamins’, shortcuts, and athletic citizenship in Ethiopia and Cameroon: considering sporting ethics beyond biomedicine « Vitamines », courts‐circuits et citoyenneté sportive en Éthiopie et au Cameroun : l’éthique du sport, au‐delà de la biomédecine

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
This article argues that the current way of thinking about ethics in sport in primarily biomedical terms, and in particular in terms of the presence of particular pharmaceutical substances, fails to account for broader notions of sporting ethics and fairness in the Global South.
Michael Crawley, Uroš Kovač
wiley   +1 more source

Short Variable Length Domain Extenders with Beyond Birthday Bound Security

open access: yes, 2018
Length doublers are cryptographic functions that transform an n-bit cryptographic primitive into an efficient and secure cipher that length-preservingly encrypts strings of length in \([n,2n-1]\). All currently known constructions are only proven secure up to the birthday bound, and for all but one construction this bound is known to be tight.
Chen, Y.L., Mennink, B., Nandi, M.
openaire   +2 more sources

Understanding Family Dynamics in Mixed‐Status Families: A Qualitative Interpretive Meta‐Synthesis

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT In the United States, mixed‐status families, where at least one member lacks legal immigration status, face persistent challenges related to deportation, which disrupt family stability, influence parental practices and impact children's identity formation.
Maryam Rafieifar   +2 more
wiley   +1 more source

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]

open access: yes, 2020
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core   +1 more source

Divorcescapes: Family Conflicts and Children's Lived Spaces

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT This article presents an analysis from a project that focuses on the entanglements that emerge between practices within the family law system and the everyday lives of children in conflictual family law cases. We position our analysis in critical childhood studies and zoom in on the social–spatial dimensions of children's everyday lives by ...
Hanne Warming, Sarah Alminde
wiley   +1 more source

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata   +3 more
doaj   +1 more source

Behind the Curtain: COVID‐19 as a Lens to Precarity in Museum Labor

open access: yesCurator: The Museum Journal, EarlyView.
ABSTRACT Using in‐depth interviews with emerging and early professional museum workers in New Orleans, Louisiana, this article expands on scholarship around the perceived and actual value of nonprofit labor. It adds qualitative support to the argument that museum labor is real labor—open to exploitation and abuse while constantly negotiated internally ...
Miriam Taylor Fair
wiley   +1 more source

The new poor law and the health of the population of England and Wales

open access: yesThe Economic History Review, EarlyView.
Abstract We estimate the impact of reductions in poor law expenditure on rural life expectancy and mortality rates in England and Wales following the 1834 Poor Law Amendment Act. Given the scale of cuts imposed, our estimates imply 8–10 per cent increases in mortality at ages 1–4 years and 2–4 per cent falls in rural expectation of life at birth.
David Green   +3 more
wiley   +1 more source

216 Jewish Hospital of St. Louis [PDF]

open access: yes, 1966
https://digitalcommons.wustl.edu/bjc_216/1078/thumbnail ...

core   +1 more source

Home - About - Disclaimer - Privacy