Results 41 to 50 of about 10,588 (175)

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

Increasing Youth Safety and Responsible Behavior Online: Putting in Place Programs that Work. [PDF]

open access: yes, 2011
Hundreds of programs are being developed to promote safe and responsible online behavior among youth. They are being successfully marketed and eagerly adopted because of their appealing content, exciting graphics, engaging games, catchy phrases and cool ...
Finkelhor, David, Jones, Lisa M.
core   +1 more source

3D Textured Model Encryption via 3D Lu Chaotic Mapping

open access: yes, 2017
In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration.
A Bogdanov   +9 more
core   +1 more source

Latinos mobilizing beyond threats: The role of fear and hope in issue activism

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Interest groups intent on spurring political participation often highlight potential threats to galvanize audiences into action. However, while loss aversion is typically seen as a strong motivator, it is important not to neglect the motivational effect of hope and reward‐seeking behavior as people navigate their political landscape.
Vanessa Cruz Nichols
wiley   +1 more source

The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]

open access: yes, 2009
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A.   +4 more
core   +1 more source

Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail

open access: yesPublic Administration, EarlyView.
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley   +1 more source

Impossible Boomerang Attack for Block Cipher Structures [PDF]

open access: yes, 2009
Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search.
Jiali Choy, Huihui Yap
openaire   +1 more source

The Polarization of the Cosmic Microwave Background Due to Primordial Gravitational Waves

open access: yes, 2006
We review current observational constraints on the polarization of the Cosmic Microwave Background (CMB), with a particular emphasis on detecting the signature of primordial gravitational waves.
ALEXANDER G. POLNAREV   +11 more
core   +1 more source

Turnover experiences in public accounting and alumni's decisions to “give back”

open access: yesContemporary Accounting Research, Volume 43, Issue 1, Page 201-235, Spring 2026.
Abstract This study examines turnover experiences in public accounting, including the exit phase (from public accountants' initial thoughts of leaving to their exit) and the post‐exit phase (from their exit to the present moment) of the turnover process.
Lindsay M. Andiola   +2 more
wiley   +1 more source

Amplified Boomerang Attack against Reduced-Round SHACAL [PDF]

open access: yes, 2002
SHACAL is a 160-bit block cipher based on the hash standard SHA-1, as a submission to NESSIE. SHACAL uses the XOR, modular addition operation and the functions of bit-by-bit manner. These operations and functions make the differential cryptanalysis difficult, i.e, it is hard to find a long differential characteristic with high probability.
Jongsung Kim   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy