Results 111 to 120 of about 36,777 (311)

Cellular Mechanism and Key Insights in Allergen Immunotherapy for Allergic Rhinitis

open access: yesWorld Journal of Otorhinolaryngology - Head and Neck Surgery, EarlyView.
ABSTRACT Allergic rhinitis (AR) arises from immune responses mediated by immunoglobulin E (IgE) to inhaled allergens, representing one of the most prevalent chronic conditions worldwide. Although AR may not be a serious ailment, it holds clinical relevance as it underpins numerous complications, serves as a major risk factor for suboptimal asthma ...
Zhe Wang   +3 more
wiley   +1 more source

Success and failure in foreign policy: Comparing Bob Hawke and Kevin Rudd's regional order‐building initiatives

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Remarkably little is known about what factors drive success or failure in foreign policy. In part, this is because there is little fundamental agreement on what constitutes success or failure in this domain in the first place. This article engages with these shortcomings by comparing two similar regional order‐building initiatives overseen by ...
Benjamin Day
wiley   +1 more source

Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

open access: yes, 2018
Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in ...
Bappy, Jawadul H.   +8 more
core  

A fundamental flaw in the ++AE authenticated encryption mode

open access: yesJournal of Mathematical Cryptology, 2018
In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext ...
Qahur Al Mahri Hassan   +4 more
doaj   +1 more source

Provably secure certificate less blind proxy re-signatures

open access: yesTongxin xuebao, 2012
Using bilinear groups,an efficient certificate less blind proxy re-signature scheme was proposed based on the proxy re-signature scheme and blind signature scheme.The scheme solves the using of certificate in certificate-based scheme and removes key ...
Tao FENG, Yi-xin LIANG
doaj   +2 more sources

Layer-Wise Cue Alignment for Unified Face Attack Detection With Vision-Language Model

open access: yesIET Biometrics
Unified face attack detection (UAD), which simultaneously addresses physical presentation attacks (PAs) and digital forgery attacks (DAs) with a vision-language model, remains challenging due to the difficulty of effectively separating live and fake cues.
Yongze Li   +7 more
doaj   +1 more source

Fiscal grievance politics: wealth taxation and master‐race democracy in post‐coup Bolivia Politique des griefs fiscaux : impôt sur la fortune et démocratie de la race maîtresse en Bolivie post‐coup d’État

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
This article analyses a new wealth tax (the IGF) in Bolivia against the backdrop of the 2019 ousting of former president Evo Morales. In doing so, it engages calls for ‘a return to politics’ in anthropology by proposing the notion of a ‘fiscal grievance politics’ as animating elite opposition to the tax in lowland Santa Cruz department. I show that the
Charles Dolph
wiley   +1 more source

Civility, honour and male aggression in early modern English jestbooks

open access: yesGender &History, EarlyView.
Abstract This article discusses the comical representation of inter‐male violence within early modern English jestbooks. It is based on a rigorous survey of the genre, picking out common themes and anecdotes, as well as discussing their reception and sociable functions. Previous scholarship has focused on patriarchs, subversive youths and impoliteness.
Tim Somers
wiley   +1 more source

Forgery Attack is a Piece of Cake on a Class of Mutual Authentication Protocols

open access: yesInternational Journal of Information and Communication Technology Research, 2012
A suitable mutual authentication protocol for an RFID system should provide mutual authentication along with user privacy. In addition, such protocol must be resistant to active and passive attacks, e.g.
Nasour Bagheri   +4 more
doaj  

‘A Sort of Armed Argument’: Ireland's Civil War of Words

open access: yesHistory, EarlyView.
Abstract This article sets out to contribute to the study of the languages of European civil wars through outlining and analysing the deployment of language as a weapon by the opposing sides of the Irish independence movement that split over the terms of the Anglo‐Irish Treaty of December 1921.
DONAL Ó DRISCEOIL
wiley   +1 more source

Home - About - Disclaimer - Privacy