Results 81 to 90 of about 94,502 (210)
Fugitive Junctures: Life‐Seeking, Route‐Finding and the Mobile Ensemble at Kenya's Borders
Short Abstract Fugitivity has become an important conceptual frame to understand the illegalised mobilities of contemporary migrants in conjunction with enslaved people's historical lines of flight as spatial praxes to seize their own freedom. Thinking from Kenya, and drawing on research with migrants, border officials, activists, police and smugglers,
Hanno Brankamp
wiley +1 more source
Small Stretch Problem of the DCT Scheme and How to Fix It
DCT is a beyond-birthday-bound (BBB) deterministic authenticated encryption (DAE) mode proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation of DCT employs the BRW polynomial, which is more efficient than the usual
Yuchao Chen +5 more
doaj +1 more source
When survival becomes politics: Necessity activism and identity work under precarity
Abstract Collective action is essential for tackling social, institutional, and environmental challenges, often fueled by shared identities, common norms, and a belief in the possibility of change. However, the impact of participating in collective action on individual identities, and how this knowledge can shape future efforts to maintain engagement ...
Lucia Garcia‐Lorenzo +2 more
wiley +1 more source
ABSTRACT Functional near‐infrared spectroscopy (fNIRS) is a popular optical neuroimaging method; however, participants with Afro‐textured (i.e., dark, coarse, curly) hair are often excluded due to difficulty obtaining sensor–scalp contact. Grounded in lived experience and sociocultural literature, we aimed to develop and evaluate culturally responsive ...
Abria S. Simmons +3 more
wiley +1 more source
THF: Designing Low-Latency Tweakable Block Ciphers
We introduce the Three-Hash Framework (THF), a new instantiation of the LRW+ paradigm that employs three hash functions to process tweak inputs. We prove that THF achieves beyond-birthday-bound security under standard assumptions.
Jianhua Wang +5 more
doaj +1 more source
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme- [PDF]
Tweakable HCTR is an tweakable enciphering proposed by Dutta and Nandi in Indocrypt 2018. It provides beyond birthday bound security when each tweak value is not used too frequently.
Mustafa Khairallah
core
Trauma‐informed care in early intervention: Providers’ barriers, boundaries, and needs
Abstract Young children who receive early intervention (EI) services are at increased likelihood of having experienced trauma, as trauma is most common in the birth‐to‐three age range, especially for children with disabilities. Little is known about EI services for trauma‐impacted children and families. Previous research suggested that EI providers are
Crystal S. Williams +2 more
wiley +1 more source
Cross-Domain Discovery of Communication Peers. Identity Mapping and Discovery Services (IMaDS)
The upcoming WebRTC-based browser-to-browser communication services present new challenges for user discovery in peer-to-peer mode. Even more so, if we wish to enable different web communication services to interact.
Beierle, Felix +6 more
core +1 more source
“A Place Where Freedom Means Something”: James Baldwin's Global Maroon Geographies
Abstract Despite his vocal support for the Algerian revolution, Palestinian liberation, and the South African anti‐apartheid struggle, James Baldwin has continued to be regarded as a thinker whose work predominantly revolved around themes of civil rights, cross‐racial dialogue, and integration.
Ida Danewid
wiley +1 more source
Generic Attacks on Double Block Length Sponge Hashing
The sponge construction is one of the main modes of operation for hash functions. Using a permutation of width b = r + c, the sponge construction with rate r and capacity c is indifferentiable up to Ω(2c/2) permutation calls.
Gaëtan Leurent, César Mathéus
doaj +1 more source

