Results 71 to 80 of about 48,172 (181)

The Very Idea of Seriousness

open access: yesEuropean Journal of Philosophy, EarlyView.
Abstract What norms govern aesthetic conversations? In Hansen and Adams (2024), we argue for a norm we call, following Stanley Cavell, “the hope of agreement”, along with a requirement of “seriousness”, the “discipline of accounting for one's judgments”.
Nat Hansen, Zed Adams
wiley   +1 more source

Multiparty quantum secret splitting and quantum state sharing

open access: yes, 2006
A protocol for multiparty quantum secret splitting is proposed with an ordered $N$ EPR pairs and Bell state measurements. It is secure and has the high intrinsic efficiency and source capacity as almost all the instances are useful and each EPR pair ...
Deng, Fu-Guo   +4 more
core   +1 more source

Disguising the Familiar: Considering Internal Confidentiality in Individual Interviews With Partners and Families

open access: yesJournal of Family Theory &Review, EarlyView.
ABSTRACT This article draws attention to the ethical and methodological complexities of internal confidentiality in family research and provides field‐specific recommendations. Conducting individual (rather than joint) interviews with partners or multiple members of the same family is common but poses significant challenges around internal ...
Susie Bower‐Brown, Clare Stovell
wiley   +1 more source

Caught Between Privacy and Surveillance: Explaining the Long‐Term Stagnation of Data Protection Regulation in Liberal Democracies

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article pursues two objectives. First, it aims to trace the genealogy of data protection regulation in major liberal democracies. To do so, it examines the evolution of this regulation in the United States, France, and Germany, among others, and relies on the policy actors' triangle framework.
Nicolas Bocquet
wiley   +1 more source

Fugitive Junctures: Life‐Seeking, Route‐Finding and the Mobile Ensemble at Kenya's Borders

open access: yesTransactions of the Institute of British Geographers, EarlyView.
Short Abstract Fugitivity has become an important conceptual frame to understand the illegalised mobilities of contemporary migrants in conjunction with enslaved people's historical lines of flight as spatial praxes to seize their own freedom. Thinking from Kenya, and drawing on research with migrants, border officials, activists, police and smugglers,
Hanno Brankamp
wiley   +1 more source

Eavesdropping and animal conflict [PDF]

open access: yesProceedings of the National Academy of Sciences, 2001
Fights between pairs of animals frequently take place within a wider social context. The displays exchanged during conflict, and the outcome of an encounter, are often detectable by individuals who are not immediately involved. In at least some species, such bystanders are known to eavesdrop on contests between others, and to modify their behavior ...
openaire   +2 more sources

The impact of urbanisation on social behaviour: a comprehensive review

open access: yesBiological Reviews, Volume 101, Issue 2, Page 1003-1035, April 2026.
ABSTRACT Urbanisation is a key driver of global environmental change and presents animals with novel stressors and challenges. It can fundamentally influence social behaviour and has the potential to reshape within‐ and between‐species social interactions. Given the role of social behaviour in reproductive fitness and survival, understanding how social
Avery L. Maune   +2 more
wiley   +1 more source

Anti-Eavesdropping by Exploiting the Space–Time Coupling in UANs

open access: yesJournal of Marine Science and Engineering
Due to the space–time coupling access, we find that anti-eavesdropping opportunities exist in underwater acoustic networks (UANs), where packets can be successfully received only by the intended receiver, but collide at the unintended receivers.
Yan Wang   +5 more
doaj   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Eavesdropping on ecosystems [PDF]

open access: yesCurrent Biology, 2020
Summary Acoustic monitoring is increasingly used to observe wildlife that might otherwise remain elusive, such as marine mammals. It is also useful on land and in the air, however, enabling researchers to study a range of questions from evolution through to ecology. Michael Gross reports.
openaire   +1 more source

Home - About - Disclaimer - Privacy