Results 41 to 50 of about 10,650 (191)

NEW KEY EXPANSION FUNCTION OF RIJNDAEL 128-BIT RESISTANCE TO THE RELATED-KEY ATTACKS

open access: yesJournal of ICT, 2018
A master key of special length is manipulated based on the key schedule to create round sub-keys in most block ciphers. A strong key schedule is described as a cipher that will be more resistant to various forms of attacks, especially in related-key ...
Hassan Mansur Hussien   +2 more
doaj   +1 more source

Boomerang Attack on Step-Reduced SHA-512 [PDF]

open access: yes, 2015
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack.
Hongbo Yu, Dongxia Bai
openaire   +1 more source

State‐Level Politics in Forest Governance: The Role of the Narrative‐Policy Nexus in the Brazilian Amazon

open access: yesEnvironmental Policy and Governance, EarlyView.
ABSTRACT Deforestation and its social impacts are an enduring challenge in agrarian frontiers, especially in the tropics. Fueled by global demand for commodities, this process is mediated by ideas, concepts, meanings, and policies that uphold socioenvironmental degradation. A key and understudied—arena in which this mediation occurs is the sub‐national
Gabriela Russo Lopes, Fabio de Castro
wiley   +1 more source

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

The “Magic” of Conflict: How Participatory Governance Can Enable Transformative Climate Adaptation

open access: yesEnvironmental Policy and Governance, EarlyView.
ABSTRACT In many cases, addressing climate risks requires transformative climate adaptation (TCA) that goes beyond small adjustments to existing systems. While scholars increasingly argue that participatory governance is key and should embrace conflict rather than push for consensus to enable TCA, this assumption remains underexplored.
Dore Engbersen   +2 more
wiley   +1 more source

The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]

open access: yes, 2009
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A.   +4 more
core   +1 more source

Education & countering violent extremism: western logics from South to North [PDF]

open access: yes, 2017
This paper explores the way education and conflict have become entangled during the post-9/11 ‘war on terror’ response to ‘radical Islam’ at home and abroad. The paper charts the complex ways that education has been deployed to serve Western military and
Novelli, Mario
core   +1 more source

Latinos mobilizing beyond threats: The role of fear and hope in issue activism

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Interest groups intent on spurring political participation often highlight potential threats to galvanize audiences into action. However, while loss aversion is typically seen as a strong motivator, it is important not to neglect the motivational effect of hope and reward‐seeking behavior as people navigate their political landscape.
Vanessa Cruz Nichols
wiley   +1 more source

The Polarization of the Cosmic Microwave Background Due to Primordial Gravitational Waves

open access: yes, 2006
We review current observational constraints on the polarization of the Cosmic Microwave Background (CMB), with a particular emphasis on detecting the signature of primordial gravitational waves.
ALEXANDER G. POLNAREV   +11 more
core   +1 more source

Level discrimination of speech sounds by hearing-impaired individuals with and without hearing amplification [PDF]

open access: yes, 2011
Objectives: The current study was designed to see how hearing-impaired individuals judge level differences between speech sounds with and without hearing amplification.
Akeroyd, Michael A., Whitmer, William M.
core   +1 more source

Home - About - Disclaimer - Privacy