Results 51 to 60 of about 93,599 (182)
Background Central to major depressive disorder (MDD) onset and maintenance is maladaptive self‐focused attention, which can be reliably indexed by greater: (a) usage of first‐person singular pronouns (e.g., I) in natural language and (b) alpha oscillations in resting‐state EEG.
Lilian Y. Li +13 more
wiley +1 more source
The Flemish connection: socio-cultural news from London in the Ghendtsche post-tydingen (1667-1723) [PDF]
The two case studies in this essay call attention to the Ghent newspaper Ghendtsche Post-tydingen (1667-1723) as a neglected source of information, not only on English theatrical matters but also-and primarily-on the political significance of such news ...
Uytterschout, Sien +1 more
core +2 more sources
Background Prospective and retrospective measures of childhood maltreatment often identify different individuals and are differentially associated with psychopathology. This study examines psycho‐social factors that may explain discrepancies between these measures.
Oonagh Coleman +5 more
wiley +1 more source
Permutation-Based Hashing Beyond the Birthday Bound
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size.
Charlotte Lefevre, Bart Mennink
doaj +1 more source
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti +4 more
doaj +1 more source
Foundations, Properties, and Security Applications of Puzzles: A Survey
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed +2 more
core
ABSTRACT As transnational land investments continue to expand across the Global South, land governance in many settings is shifting from largely informal arrangements towards greater formalization. However, we know less about how entrepreneurs sustain and rework land control as host states tighten regulation and introduce new formal requirements and ...
Ben Fan, Xiaobo Hua, Yasuyuki Kono
wiley +1 more source
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security of protocols that use them as random functions.
Moody Dustin +2 more
doaj +1 more source
DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate
Recent parallelizable message authentication codes (MACs) have demonstrated the benefit of tweakable block ciphers (TBCs) for authentication with high security guarantees. With ZMAC, Iwata et al.
Tony Grochow, Eik List, Mridul Nandi
doaj +1 more source
Evaluating the Extent and Nature of ‘Envelope Wages’ in the European Union: A Geographical Analysis [PDF]
To evaluate the spatialities of the illegal wage practice where employers pay their declared employees both an official declared wage and an undeclared ‘envelope’ wage so as to avoid tax liabilities, a 2007 survey conducted in 27 European Union (EU ...
Williams, Colin
core +1 more source

