Results 61 to 70 of about 10,387 (191)

Anatomy of a Curved Orogen: The Broken River Orocline in the Northeastern Tasmanides (Australia)

open access: yesTectonics, Volume 44, Issue 8, August 2025.
Abstract Oroclines record crustal and lithospheric‐scale processes in active plate margins. In northeastern Australia, the Broken River Orocline is marked by the curvature of structural fabrics and tectonic elements. However, the geometry, structural evolution, and tectonic implications of this orocline are poorly understood.
Raiza Toledo Rodrigues   +2 more
wiley   +1 more source

The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]

open access: yes, 2009
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A.   +4 more
core   +1 more source

The Boomerang Attacks on BLAKE and BLAKE2 [PDF]

open access: yes, 2015
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities \(2^{464}\) and \(2^{474}\) respectively.
openaire   +2 more sources

Culturally Modified Trees and Bark and Wooden Material Culture From Yagara Country, Southeast Queensland, Australia: A Preliminary Overview of Indigenous Biocultural Knowledge

open access: yesArchaeology in Oceania, Volume 60, Issue 2, Page 95-118, July 2025.
ABSTRACT This paper outlines preliminary results from our multimethod research about Culturally Modified Trees (CMTs) and associated bark and wooden material culture in Yagara Country in southeast Queensland. Methods employed include historical source and modern database analysis, archaeological field surveys, semi‐structured interviews with Yagara ...
Kate Greenwood   +3 more
wiley   +1 more source

Understanding Terrorist Organizations with a Dynamic Model

open access: yes, 2009
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a
A. Gutfraind   +25 more
core   +1 more source

Harry Potter and the SPELL Against Bullying

open access: yesJournal of Community &Applied Social Psychology, Volume 35, Issue 4, July/August 2025.
ABSTRACT The Harry Potter saga has been—and still is—a worldwide phenomenon, attracting the interest of millions of people. Leveraging this success and the potential for the storyline to act as a moral guide, we developed and tested the SPELL, a scientifically‐driven anti‐bullying intervention based on the Harry Potter novels.
Loris Vezzali   +6 more
wiley   +1 more source

To Share or Not to Share in Client-Side Encrypted Clouds

open access: yes, 2014
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core   +1 more source

Cultural Revolution: Mykhail Semenko, Ukrainian Futurism and the “National” Category [PDF]

open access: yes, 2017
This paper examines Mykhail Semenko’s Futurist manifestos that developed an opposition between “national” and “international” art, and specifically called “national” art provincial and retrograde.
Ilnytzkyj, Oleh S.
core   +1 more source

Return Fantasies: Martial Masculinity, Misogyny and Homosocial Bonding in the Aftermath of Second World War

open access: yesGender &History, Volume 37, Issue 2, Page 715-730, July 2025.
Abstract This article explores male popular culture in Australia in the mid‐1940s, particularly men's magazines of the period, to illuminate aspects of the psycho‐sexual dimensions of Australian veterans returning to civil society. The sexual landscape of Australian society had undergone considerable transformation, especially through an increasing ...
Stephen Garton
wiley   +1 more source

Algebraic Techniques in Differential Cryptanalysis [PDF]

open access: yes, 2008
. In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic relations arising from differential characteristics to speed up and ...
Albrecht, Martin, Cid, Carlos
core   +5 more sources

Home - About - Disclaimer - Privacy