Results 211 to 220 of about 36,777 (311)
Abstract While research on ecosystems and their orchestration has grown rapidly, we still know little about how individual strategic leaders may mobilize ecosystemic action in times of disruption. This article addresses this gap by drawing on an in‐depth case study of the Antwerp Square Mile, the world’s oldest and most renowned diamond trading ...
Bart De Keyser, Koen Vandenbempt
wiley +1 more source
Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones. [PDF]
Su Y +5 more
europepmc +1 more source
Of Carcasses and Christ: Rereading the Repugnant Ecological Other
ABSTRACT This essay claims that a collection of hunting and fishing devotionals provincializes a common trope in environmental literatures: the figure of the repugnantly anti‐ecological conservative Protestant. A close reading of these texts reveals their authors’ and ideal audiences’ extensive knowledge of land and animal minds, which deflates their ...
Colin B. Weaver
wiley +1 more source
Distributed storage database system for motion data based on blockchain technology. [PDF]
Wang P, Zhao Z.
europepmc +1 more source
Certificateless data integrity auditing with sparse Merkle trees for the cloud-edge environment. [PDF]
Du R, Wang Z, Shen J.
europepmc +1 more source
ABSTRACT Christian nationalism scholarship and discourse has surged in the years since Trump's 2016 election victory, even as, by most measures, adherence to Christian nationalist beliefs has declined. Applying scholarship on political backlash, I propose that this apparent discrepancy may be explained both by ideological trends antithetical to public ...
Jesse Smith
wiley +1 more source
A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs. [PDF]
Rajkumar Y, Santhosh Kumar SVN.
europepmc +1 more source
Abstract The COVID‐19 pandemic was a crisis in prisons and jails, with some of the largest outbreaks in the United States happening inside carceral facilities. In the absence of structural interventions to protect them, people inside prisons engaged in various forms of carework to support one another and to draw attention to the horrific conditions. We
Esther Melton +2 more
wiley +1 more source
Real-time multi-class threat detection and adaptive deception in Kubernetes environments. [PDF]
Aly A, Hamad AM, Al-Qutt M, Fayez M.
europepmc +1 more source

