Results 41 to 50 of about 1,042,587 (227)

DPA Protected Implementation of OCB and COLM Authenticated Ciphers

open access: yesIEEE Access, 2019
Authenticated ciphers are designed to provide two security requirements simultaneously, i.e. confidentiality and integrity. The CAESAR competition was ended with introducing six authenticated ciphers for several applications as the winners.
Mohsen Jahanbani   +2 more
doaj   +1 more source

Spenser and the Historical Revolution: Briton Moniments and the Problem of Roman Britain [PDF]

open access: yes, 1996
Curran argues that, since Roman Britain is a key to understanding the historiographical debates of Edmund Spenser\u27s time, the Roman Britain section of Briton Moniments in The Faerie Queene needs to be examined.
Curran, John E., Jr.
core   +1 more source

Analysis of Single Particles of Amyloid Beta and α‐Synuclein With Seeded Amplification for the Diagnosis of Alzheimer's and Parkinson's Disease

open access: yesBiotechnology and Applied Biochemistry, EarlyView.
ABSTRACT Neurodegenerative diseases, including Alzheimer's disease (AD) and Parkinson's disease (PD), are characterized by the pathological aggregation of specific proteins such as amyloid beta (Aβ) and α‐synuclein, respectively. Early detection of these protein aggregates in biological fluids could facilitate timely diagnosis and therapeutic ...
Alexandra Dybala   +4 more
wiley   +1 more source

The Rhetorical Implications of Clementia in Cicero’s Caesarian Speeches [PDF]

open access: yes, 2007
Cicero’s Caesarian speeches were delivered in 46-45 B.C. to Caesar after his victories in the Civil War. Caesar faced a number of critical issues as he dealt with the political and social aftermath of the years after 49 B.C., including what to do with ...
Rozeboom, Aaron
core   +2 more sources

Communication of Business‐Nonprofit Collaborations and Environmental Legitimacy: Exploratory Insights From Italian Firms

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Collaborations with nonprofits can enhance firms' legitimacy, yet the relationship between their communication and corporate environmental legitimacy remains poorly understood. Furthermore, research lacks an analysis of the communication of business‐nonprofit collaborations through multiple actors' perspectives.
Andrea Rizzuni   +3 more
wiley   +1 more source

No. 16: The State of Food Insecurity in Msunduzi Municipality, South Africa [PDF]

open access: yes, 2012
There is plenty of food in Msunduzi, in South Africa’s KwaZulu-Natal province, but the urban poor regularly go hungry. This study of Msunduzi’s food security situation formed part of AFSUN’s baseline survey of eleven Southern African cities.
Caesar, Mary   +2 more
core   +1 more source

Sharing the light, impact of solar parks on plant productivity, soil microbes and soil organic matter

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Solar parks enable renewable energy production at a large scale, thereby reducing greenhouse gas emissions. However, the effects of this change in land use on vegetation and soil health are still largely unknown. In this study, we determined the impacts of solar parks on vegetation, soil biota and soil carbon between and below solar panels.
Luuk Scholten   +4 more
wiley   +1 more source

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

Big Bird: A global dataset of birds in drone imagery annotated to species level

open access: yesRemote Sensing in Ecology and Conservation, EarlyView.
Drones are a valuable tool for surveying birds, but manually detecting and identifying birds in drone images is costly. We assembled a diverse dataset of 23 865 images of birds captured with 21 different drones across 11 countries. We labelled 4824 of these images, detailing the location, species, posture category, age category, and sex of 49 990 birds
Joshua P. Wilson   +19 more
wiley   +1 more source

Forgery and Subkey Recovery on CAESAR Candidate iFeed

open access: yesACM Symposium on Applied Computing, 2015
iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first round candidate to the CAESAR competition.
W. Schroé   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy