Results 241 to 250 of about 10,475,631 (365)
ABSTRACT Issue Addressed Health inequity for sexual minority (lesbian, gay and bisexual) people compared with heterosexual people is well documented globally. However, limited local data have been used to inform health policy and practice. This project analysed data from the New Zealand Health Survey to determine areas of inequity in health behaviours ...
Jeffery Adams+3 more
wiley +1 more source
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM+6 more
europepmc +1 more source
ABSTRACT Predatory journals are a known hazard in modern academic research publishing, with research and anecdotal accounts indicating that they exploit inexperienced researchers. Most literature on the topic centres on specific disciplines and/or countries deemed ‘more vulnerable’ to publishing scams.
Nicole R. Webber+5 more
wiley +1 more source
Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture. [PDF]
Wen Y, Su Y, Li W.
europepmc +1 more source
ABSTRACT Advancing evidence‐based practice requires nurses to have competence in the spectrum of evidence‐translation process known as evidence‐based healthcare. A scoping review was conducted to identify the instruments used to measure nurses evidence‐based healthcare competence and map the associated background factors.
Henna Härkönen+11 more
wiley +1 more source
Hash function‐based secret sharing scheme designs
Chi Sing Chum, Xiaowen Zhang
openalex +1 more source
ABSTRACT Background Low Earth Orbit (LEO) satellite constellations are redefining the concept of global connectivity, opening up a new world of opportunities for communication services and applications. Purpose The emergence of LEO satellites (SATs) is ushering in a new era of innovation, where new complex technologies are being developed, and the use ...
Pilar Manzanares‐Lopez+2 more
wiley +1 more source
A robust and effective smart-card-based remote user authentication mechanism using hash function. [PDF]
Das AK, Odelu V, Goswami A.
europepmc +1 more source
A Secure Multipath Transmission Scheme Based on One-Way Hash Functions in Wireless Sensor Networks
Yun-Jeong Lee+4 more
openalex +2 more sources