Results 61 to 70 of about 10,387 (191)
Anatomy of a Curved Orogen: The Broken River Orocline in the Northeastern Tasmanides (Australia)
Abstract Oroclines record crustal and lithospheric‐scale processes in active plate margins. In northeastern Australia, the Broken River Orocline is marked by the curvature of structural fabrics and tectonic elements. However, the geometry, structural evolution, and tectonic implications of this orocline are poorly understood.
Raiza Toledo Rodrigues +2 more
wiley +1 more source
The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home [PDF]
Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack.
Abu, N.A. +4 more
core +1 more source
The Boomerang Attacks on BLAKE and BLAKE2 [PDF]
In this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities \(2^{464}\) and \(2^{474}\) respectively.
openaire +2 more sources
ABSTRACT This paper outlines preliminary results from our multimethod research about Culturally Modified Trees (CMTs) and associated bark and wooden material culture in Yagara Country in southeast Queensland. Methods employed include historical source and modern database analysis, archaeological field surveys, semi‐structured interviews with Yagara ...
Kate Greenwood +3 more
wiley +1 more source
Understanding Terrorist Organizations with a Dynamic Model
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a
A. Gutfraind +25 more
core +1 more source
Harry Potter and the SPELL Against Bullying
ABSTRACT The Harry Potter saga has been—and still is—a worldwide phenomenon, attracting the interest of millions of people. Leveraging this success and the potential for the storyline to act as a moral guide, we developed and tested the SPELL, a scientifically‐driven anti‐bullying intervention based on the Harry Potter novels.
Loris Vezzali +6 more
wiley +1 more source
To Share or Not to Share in Client-Side Encrypted Clouds
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core +1 more source
Cultural Revolution: Mykhail Semenko, Ukrainian Futurism and the “National” Category [PDF]
This paper examines Mykhail Semenko’s Futurist manifestos that developed an opposition between “national” and “international” art, and specifically called “national” art provincial and retrograde.
Ilnytzkyj, Oleh S.
core +1 more source
Abstract This article explores male popular culture in Australia in the mid‐1940s, particularly men's magazines of the period, to illuminate aspects of the psycho‐sexual dimensions of Australian veterans returning to civil society. The sexual landscape of Australian society had undergone considerable transformation, especially through an increasing ...
Stephen Garton
wiley +1 more source
Algebraic Techniques in Differential Cryptanalysis [PDF]
. In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic relations arising from differential characteristics to speed up and ...
Albrecht, Martin, Cid, Carlos
core +5 more sources

