Results 81 to 90 of about 94,502 (210)

Fugitive Junctures: Life‐Seeking, Route‐Finding and the Mobile Ensemble at Kenya's Borders

open access: yesTransactions of the Institute of British Geographers, EarlyView.
Short Abstract Fugitivity has become an important conceptual frame to understand the illegalised mobilities of contemporary migrants in conjunction with enslaved people's historical lines of flight as spatial praxes to seize their own freedom. Thinking from Kenya, and drawing on research with migrants, border officials, activists, police and smugglers,
Hanno Brankamp
wiley   +1 more source

Small Stretch Problem of the DCT Scheme and How to Fix It

open access: yesIACR Transactions on Symmetric Cryptology
DCT is a beyond-birthday-bound (BBB) deterministic authenticated encryption (DAE) mode proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation of DCT employs the BRW polynomial, which is more efficient than the usual
Yuchao Chen   +5 more
doaj   +1 more source

When survival becomes politics: Necessity activism and identity work under precarity

open access: yesPolitical Psychology, Volume 47, Issue 2, April 2026.
Abstract Collective action is essential for tackling social, institutional, and environmental challenges, often fueled by shared identities, common norms, and a belief in the possibility of change. However, the impact of participating in collective action on individual identities, and how this knowledge can shape future efforts to maintain engagement ...
Lucia Garcia‐Lorenzo   +2 more
wiley   +1 more source

Developing Best Practices for Inclusion in fNIRS Research: Equity for Participants With Afro‐Textured Hair

open access: yesDevelopmental Psychobiology, Volume 68, Issue 2, March 2026.
ABSTRACT Functional near‐infrared spectroscopy (fNIRS) is a popular optical neuroimaging method; however, participants with Afro‐textured (i.e., dark, coarse, curly) hair are often excluded due to difficulty obtaining sensor–scalp contact. Grounded in lived experience and sociocultural literature, we aimed to develop and evaluate culturally responsive ...
Abria S. Simmons   +3 more
wiley   +1 more source

THF: Designing Low-Latency Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology
We introduce the Three-Hash Framework (THF), a new instantiation of the LRW+ paradigm that employs three hash functions to process tweak inputs. We prove that THF achieves beyond-birthday-bound security under standard assumptions.
Jianhua Wang   +5 more
doaj   +1 more source

A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme- [PDF]

open access: yes
Tweakable HCTR is an tweakable enciphering proposed by Dutta and Nandi in Indocrypt 2018. It provides beyond birthday bound security when each tweak value is not used too frequently.
Mustafa Khairallah
core  

Trauma‐informed care in early intervention: Providers’ barriers, boundaries, and needs

open access: yesInfant Mental Health Journal: Infancy and Early Childhood, Volume 47, Issue 2, March 2026.
Abstract Young children who receive early intervention (EI) services are at increased likelihood of having experienced trauma, as trauma is most common in the birth‐to‐three age range, especially for children with disabilities. Little is known about EI services for trauma‐impacted children and families. Previous research suggested that EI providers are
Crystal S. Williams   +2 more
wiley   +1 more source

Cross-Domain Discovery of Communication Peers. Identity Mapping and Discovery Services (IMaDS)

open access: yes, 2017
The upcoming WebRTC-based browser-to-browser communication services present new challenges for user discovery in peer-to-peer mode. Even more so, if we wish to enable different web communication services to interact.
Beierle, Felix   +6 more
core   +1 more source

“A Place Where Freedom Means Something”: James Baldwin's Global Maroon Geographies

open access: yesAntipode, Volume 58, Issue 2, 2026.
Abstract Despite his vocal support for the Algerian revolution, Palestinian liberation, and the South African anti‐apartheid struggle, James Baldwin has continued to be regarded as a thinker whose work predominantly revolved around themes of civil rights, cross‐racial dialogue, and integration.
Ida Danewid
wiley   +1 more source

Generic Attacks on Double Block Length Sponge Hashing

open access: yesIACR Transactions on Symmetric Cryptology
The sponge construction is one of the main modes of operation for hash functions. Using a permutation of width b = r + c, the sponge construction with rate r and capacity c is indifferentiable up to Ω(2c/2) permutation calls.
Gaëtan Leurent, César Mathéus
doaj   +1 more source

Home - About - Disclaimer - Privacy