Results 41 to 50 of about 93,608 (187)

Where Have I Seen You Before? Networks, Trust and Reciprocity as a Source of Collaboration in the Public Service

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT Although some studies focus on how bureaucrats' interactions with one another affect performance, they rarely focus on why these public servants collaborate. Bureaucrats' collaboration matters because it can significantly contribute to achieving policy goals.
Nathalie Mendez
wiley   +1 more source

Saplings of significance: Nurturing cultural value of new tree plantings through participatory opportunities

open access: yesPeople and Nature, EarlyView.
Abstract Tree‐planting initiatives are a crucial part of international sustainability and climate action efforts. Yet, many of these initiatives fail to achieve their long‐term sustainability and climate goals. The role of community value is an often‐overlooked factor in promoting the success of new tree plantings.
Claire L. Narraway   +8 more
wiley   +1 more source

Stronger Security Variants of GCM-SIV

open access: yesIACR Transactions on Symmetric Cryptology, 2016
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated.
Tetsu Iwata, Kazuhiko Minematsu
doaj   +1 more source

‘Vitamins’, shortcuts, and athletic citizenship in Ethiopia and Cameroon: considering sporting ethics beyond biomedicine « Vitamines », courts‐circuits et citoyenneté sportive en Éthiopie et au Cameroun : l’éthique du sport, au‐delà de la biomédecine

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
This article argues that the current way of thinking about ethics in sport in primarily biomedical terms, and in particular in terms of the presence of particular pharmaceutical substances, fails to account for broader notions of sporting ethics and fairness in the Global South.
Michael Crawley, Uroš Kovač
wiley   +1 more source

Understanding Family Dynamics in Mixed‐Status Families: A Qualitative Interpretive Meta‐Synthesis

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT In the United States, mixed‐status families, where at least one member lacks legal immigration status, face persistent challenges related to deportation, which disrupt family stability, influence parental practices and impact children's identity formation.
Maryam Rafieifar   +2 more
wiley   +1 more source

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers [PDF]

open access: yes, 2020
It is known that attackers can exfiltrate data from air-gapped computers through their speakers via sonic and ultrasonic waves. To eliminate the threat of such acoustic covert channels in sensitive systems, audio hardware can be disabled and the use of ...
Guri, Mordechai
core   +1 more source

Divorcescapes: Family Conflicts and Children's Lived Spaces

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT This article presents an analysis from a project that focuses on the entanglements that emerge between practices within the family law system and the everyday lives of children in conflictual family law cases. We position our analysis in critical childhood studies and zoom in on the social–spatial dimensions of children's everyday lives by ...
Hanne Warming, Sarah Alminde
wiley   +1 more source

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata   +3 more
doaj   +1 more source

Short Variable Length Domain Extenders with Beyond Birthday Bound Security

open access: yes, 2018
Length doublers are cryptographic functions that transform an n-bit cryptographic primitive into an efficient and secure cipher that length-preservingly encrypts strings of length in \([n,2n-1]\). All currently known constructions are only proven secure up to the birthday bound, and for all but one construction this bound is known to be tight.
Chen, Y.L., Mennink, B., Nandi, M.
openaire   +2 more sources

Behind the Curtain: COVID‐19 as a Lens to Precarity in Museum Labor

open access: yesCurator: The Museum Journal, EarlyView.
ABSTRACT Using in‐depth interviews with emerging and early professional museum workers in New Orleans, Louisiana, this article expands on scholarship around the perceived and actual value of nonprofit labor. It adds qualitative support to the argument that museum labor is real labor—open to exploitation and abuse while constantly negotiated internally ...
Miriam Taylor Fair
wiley   +1 more source

Home - About - Disclaimer - Privacy