Results 121 to 130 of about 157,357 (284)

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Migration, Repression and Homosexual Sociability in Francoist Spain: An Analysis of the Case Files of the Special Courts of Barcelona (1965–1975)

open access: yesGender &History, EarlyView.
ABSTRACT In Spain, under General Franco's regime, homosexuality was regarded as an antisocial and dangerous behaviour. It was thus pursued both by the police and judicial courts. The Law on Vagrants and Crooks (1954) and, subsequently, the Law on Dangerousness and Social Rehabilitation (1970) constituted the legal mechanisms used by the dictatorship to
Jordi Mas Grau, Rafael Cáceres‐Feria
wiley   +1 more source

One Password: An Encryption Scheme for Hiding Users' Register Information

open access: yes, 2017
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core  

Retirement Savings Incentives for Low‐ and Middle‐Income Individuals: Does Government Funded Matching Change Behaviour?*

open access: yesEconomic Record, EarlyView.
We evaluate a government‐funded matching policy for retirement savings contributions targeted at low‐ and middle‐income individuals. Using a difference‐in‐difference approach, we exploit administrative changes to the Australian Government's retirement contribution matching (co‐contribution) policy to identify the impact of the programme on savings ...
Kristen Sobeck, Robert Breunig
wiley   +1 more source

Caution Ahead: Numerical Reasoning and Look‐Ahead Bias in AI Models

open access: yesJournal of Accounting Research, EarlyView.
ABSTRACT Recent work within accounting and finance has highlighted that modern AI systems exhibit superhuman performance on a variety of foundational activities within these fields. However, the literature often does not provide economic rationale for why AI models seem to outperform, largely because these models are a black box.
BRADFORD LEVY
wiley   +1 more source

The effect of nearby listings on house sale prices in Sydney: A spatio‐temporal regularization approach

open access: yesReal Estate Economics, EarlyView.
Abstract We estimate the price impact of very nearby concurrently listed properties in the Sydney housing market and assess their competition effects. We apply a hedonic model with spatiotemporal effects regularized via a graph Laplacian prior at the month‐by‐SA2 regional level to seven SA4 subregions of metropolitan Sydney. The model structure enables
Willem P. Sijp, Mengheng Li
wiley   +1 more source

Revocable policy-based chameleon hash using lattices

open access: yesJournal of Mathematical Cryptology
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash.
Klamti Jean Belo, Hasan Mohammed Anwarul
doaj   +1 more source

Preserving evidence integrity in full file system extractions: Assessing hash inconsistencies and potential solutions

open access: yesJournal of Forensic Sciences, EarlyView.
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions.

open access: yes, 2012
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire   +1 more source

Home - About - Disclaimer - Privacy