Results 81 to 90 of about 93,608 (187)
ABSTRACT Introduction Familial imprisonment is one of ten recognised adverse childhood experiences (ACE), with established long‐term impacts on health, care and wellbeing. Where safe and appropriate, the right of a child to protect and maintain family life (and therefore visit and/or remain in contact with a family member in prison) is protected in the
Naomi Griffin +6 more
wiley +1 more source
When survival becomes politics: Necessity activism and identity work under precarity
Abstract Collective action is essential for tackling social, institutional, and environmental challenges, often fueled by shared identities, common norms, and a belief in the possibility of change. However, the impact of participating in collective action on individual identities, and how this knowledge can shape future efforts to maintain engagement ...
Lucia Garcia‐Lorenzo +2 more
wiley +1 more source
Generic Attacks on Double Block Length Sponge Hashing
The sponge construction is one of the main modes of operation for hash functions. Using a permutation of width b = r + c, the sponge construction with rate r and capacity c is indifferentiable up to Ω(2c/2) permutation calls.
Gaëtan Leurent, César Mathéus
doaj +1 more source
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF. [PDF]
Jha A, Nandi M.
europepmc +1 more source
216 Jewish Hospital of St. Louis [PDF]
https://digitalcommons.wustl.edu/bjc_216/1132/thumbnail ...
core +1 more source
On the Plaintext Awareness of AEAD Schemes
Plaintext-awareness of AEAD schemes is one of the more obscure and easily misunderstood notions. Originally proposed by Andreeva et al., Mennink and Talnikar showed in 2025 that the original definitions are vague and leave too much room for ...
Mario Marhuenda Beltrán +1 more
doaj +1 more source
Modeling Longevity Risk using Extreme Value Theory: An Empirical Investigation using Portuguese and Spanish Population Data [PDF]
Extreme value theory (EVT) provides a framework to formalize the study of behaviour in the tails of a distribution. In this paper we use EVT to model the statistical behaviour of mortality rates over a given high threshold age and to estimate the ...
Bravo, Jorge, Real, Pedro
core
Lower Bounds on Signatures from Symmetric Primitives [PDF]
We show that every construction of one-time signature schemes from a random oracle achieves black-box security at most $2^{(1+o(1))q}$, where $q$ is the total number of oracle queries asked by the key generation, signing, and verification algorithms ...
Barak, Boaz, Mahmoody, Mohammad
core +1 more source
Policy and Practice Brief: Funding of Assistive Technology to Make Work a Reality [PDF]
This brief provides a definition of assistive technology and a discussion of funding sources for assistive technology including: public schools; state vocational rehabilitation agencies; Medicaid; Medicare; and, SSA’s Plan for Achieving Self Support ...
Ronald , Ronald M +1 more
core +1 more source

