Results 61 to 70 of about 10,650 (191)

Can conflict-generated diasporas be moderate actors during episodes of contested sovereignty? Lebanese and Albanian diasporas compared [PDF]

open access: yes, 2011
Conflict-generated diasporas are considered likely to maintain radical behaviours. This article seeks to explain why and how they nevertheless adopt moderate claims, especially when advocating highly sensitive issues such as state sovereignty.
Koinova, Maria
core   +1 more source

Improved search models of boomerang distinguishers and application to LILLIPUT

open access: yesCybersecurity
Boomerang attack serves as a potent cryptanalytic tool for assessing the security of block ciphers. Over the past few years, various automatic search models for boomerang distinguishers have been proposed for block ciphers with different structures. This
Yunong Wu   +6 more
doaj   +1 more source

Homological Correspondence: Israel as a Frontier of Global Domination

open access: yesAntipode, Volume 58, Issue 2, March 2026.
ABSTRACT This article offers a novel framing for enquiring the deep entanglement between Israel and Western‐led global centers of domination. Moving beyond geopolitical reasonings and historical analogies, it locates this relationship within a dynamic space of homological correspondence, positioning Israel as its frontier.
Wassim Ghantous
wiley   +1 more source

Understanding Terrorist Organizations with a Dynamic Model

open access: yes, 2009
Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a
A. Gutfraind   +25 more
core   +1 more source

Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy [PDF]

open access: yes, 2011
Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked ...
Guinchard, Audrey
core   +3 more sources

The Long‐Term Effects of Populism on Foreign Policy: Berlusconi's Legacy and Its Impact on Italy's Approach to the EU and International Politics

open access: yesJCMS: Journal of Common Market Studies, Volume 64, Issue 2, Page 720-741, March 2026.
Abstract What are the long‐term effects of populism on foreign policy? This aspect has not been addressed yet by the burgeoning literature on the international consequences of populism. In this contribution, we hypothesise that the two distinctive features of populist foreign policy‐making, mobilisation/politicisation and personalisation/centralisation,
Sandra Destradi, Emidio Diodato
wiley   +1 more source

Boomerang Attacks on Hash Function Using Auxiliary Differentials [PDF]

open access: yes, 2012
In this paper we study boomerang attacks in the chosen-key setting. This is particularly relevant to hash function analysis, since many boomerang attacks have been described against ARX-based designs. We present a new way to combine message modifications, or auxiliary differentials, with the boomerang attack.
Gaëtan Leurent, Arnab Roy
openaire   +3 more sources

The Predominant Role of Musical Valence Over Arousal in Pain Modulation: A Psychophysiological Study

open access: yesInternational Journal of Psychology, Volume 61, Issue 1, February 2026.
ABSTRACT Several studies have demonstrated the potential capacity of music to induce emotions and manage pain. However, the psychophysiological mechanisms underlying the effects of emotional dimensions (valence and arousal) induced by music on the modulation of pain perception remain poorly understood.
Veronika Diaz Abrahan   +3 more
wiley   +1 more source

Increasing Youth Safety and Responsible Behavior Online: Putting in Place Programs that Work. [PDF]

open access: yes, 2011
Hundreds of programs are being developed to promote safe and responsible online behavior among youth. They are being successfully marketed and eagerly adopted because of their appealing content, exciting graphics, engaging games, catchy phrases and cool ...
Finkelhor, David, Jones, Lisa M.
core   +1 more source

To Share or Not to Share in Client-Side Encrypted Clouds

open access: yes, 2014
With the advent of cloud computing, a number of cloud providers have arisen to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and business organizations.
Ateniese, Giuseppe, Wilson, Duane
core   +1 more source

Home - About - Disclaimer - Privacy