Results 211 to 220 of about 224,799 (276)
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A +3 more
europepmc +1 more source
The Canary Down the Coalmine: Dagenham, London and Labour Politics
Abstract The history of Dagenham offers unique insights into both the changing composition of the working class and the forces that have reshaped domestic politics throughout the last 100 years, particularly the politics of the British labour movement.
Jon Cruddas
wiley +1 more source
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment. [PDF]
Soman VK, Natarajan V.
europepmc +1 more source
This article explores the activities of daily life in a village neighbouring the TEPCO nuclear power plant in Fukushima. It argues that one of the potentials of taking a dwelling perspective – a phenomenological approach to living within the ecological and social environments – emerges most compellingly within a polluted landscape.
Tomoko Sakai
wiley +1 more source
Digital watermarking for virtual physically unclonable function data concealment and authentication. [PDF]
Khan R +4 more
europepmc +1 more source
This article argues that the current way of thinking about ethics in sport in primarily biomedical terms, and in particular in terms of the presence of particular pharmaceutical substances, fails to account for broader notions of sporting ethics and fairness in the Global South.
Michael Crawley, Uroš Kovač
wiley +1 more source
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source
Why do some women choose to submit to their husbands in marriage? In anthropology, the paradox of ‘chosen submission’ has famously been explored by Saba Mahmood. Her work amongst Egyptian women donning the veil in the Islamic da'wa movement spotlights the notion of ‘piety’ to explore how devotion to God can act as a powerful motivator of human ...
Naomi Richman
wiley +1 more source
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source
Enhanced optical encryption via polarization-dependent multi-channel metasurfaces. [PDF]
Ning M +7 more
europepmc +1 more source

