Results 51 to 60 of about 93,599 (182)

Smartphone language and resting‐state EEG indicators of self‐focused attention prospectively predict major depressive disorder risk in adolescents

open access: yesJournal of Child Psychology and Psychiatry, EarlyView.
Background Central to major depressive disorder (MDD) onset and maintenance is maladaptive self‐focused attention, which can be reliably indexed by greater: (a) usage of first‐person singular pronouns (e.g., I) in natural language and (b) alpha oscillations in resting‐state EEG.
Lilian Y. Li   +13 more
wiley   +1 more source

The Flemish connection: socio-cultural news from London in the Ghendtsche post-tydingen (1667-1723) [PDF]

open access: yes, 2011
The two case studies in this essay call attention to the Ghent newspaper Ghendtsche Post-tydingen (1667-1723) as a neglected source of information, not only on English theatrical matters but also-and primarily-on the political significance of such news ...
Uytterschout, Sien   +1 more
core   +2 more sources

Psycho‐social factors associated with disagreement between prospective and retrospective measures of childhood maltreatment

open access: yesJournal of Child Psychology and Psychiatry, EarlyView.
Background Prospective and retrospective measures of childhood maltreatment often identify different individuals and are differentially associated with psychopathology. This study examines psycho‐social factors that may explain discrepancies between these measures.
Oonagh Coleman   +5 more
wiley   +1 more source

Permutation-Based Hashing Beyond the Birthday Bound

open access: yesIACR Transactions on Symmetric Cryptology
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size.
Charlotte Lefevre, Bart Mennink
doaj   +1 more source

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti   +4 more
doaj   +1 more source

Foundations, Properties, and Security Applications of Puzzles: A Survey

open access: yes, 2020
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed   +2 more
core  

Beyond the Binary of Formal and Informal: Negotiating Hybrid Land Control by Chinese Banana Entrepreneurs in Laos

open access: yesJournal of Agrarian Change, EarlyView.
ABSTRACT As transnational land investments continue to expand across the Global South, land governance in many settings is shifting from largely informal arrangements towards greater formalization. However, we know less about how entrepreneurs sustain and rework land control as host states tighten regulation and introduce new formal requirements and ...
Ben Fan, Xiaobo Hua, Yasuyuki Kono
wiley   +1 more source

Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier

open access: yesJournal of Mathematical Cryptology, 2016
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin   +2 more
doaj   +1 more source

DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Recent parallelizable message authentication codes (MACs) have demonstrated the benefit of tweakable block ciphers (TBCs) for authentication with high security guarantees. With ZMAC, Iwata et al.
Tony Grochow, Eik List, Mridul Nandi
doaj   +1 more source

Evaluating the Extent and Nature of ‘Envelope Wages’ in the European Union: A Geographical Analysis [PDF]

open access: yes, 2009
To evaluate the spatialities of the illegal wage practice where employers pay their declared employees both an official declared wage and an undeclared ‘envelope’ wage so as to avoid tax liabilities, a 2007 survey conducted in 27 European Union (EU ...
Williams, Colin
core   +1 more source

Home - About - Disclaimer - Privacy