Results 71 to 80 of about 4,115,069 (292)

The Approximate k-List Problem

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We study a generalization of the k-list problem, also known as the Generalized Birthday problem. In the k-list problem, one starts with k lists of binary vectors and has to find a set of vectors – one from each list – that sum to the all-zero target ...
Leif Both, Alexander May
doaj   +1 more source

Social Security: it ain't broken [PDF]

open access: yes
Social ...
Alicia Munnell
core  

Social Security: What Would Happen If the Trust Funds Ran Out? [PDF]

open access: yes, 2014
[Excerpt] Each year when the Social Security trustees release their annual report, attention is focused on the projection of the year that the Social Security trust funds will become insolvent.
Meyerson, Noah P
core   +2 more sources

Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih   +40 more
wiley   +1 more source

Hardware Masking, Revisited

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
MaskingHardware masking schemes have shown many advances in the past few years. Through a series of publications their implementation cost has dropped significantly and flaws have been fixed where present. Despite these advancements it seems that a limit
Thomas De Cnudde   +2 more
doaj   +1 more source

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

open access: yes, 2015
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system.
Hof, Hans-Joachim
core   +1 more source

Securing EU neighborhood - an ideational approach to EU-neighborhood relations [PDF]

open access: yes, 2011
This paper analyses the interrelationship between internal and external security discourses in the field of European Union's neighbourhood policy. The European Union can be observed to actively use security concepts developed in the internal policy-field
Dib, Laura
core  

Exploratory Analysis of ELP1 Expression in Whole Blood From Patients With Familial Dysautonomia

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Familial dysautonomia (FD) is a hereditary neurodevelopmental disorder caused by aberrant splicing of the ELP1 gene, leading to a tissue‐specific reduction in ELP1 protein expression. Preclinical models indicate that increasing ELP1 levels can mitigate disease manifestations.
Alejandra González‐Duarte   +13 more
wiley   +1 more source

Smart Accessibility: Design Process of Integrated Geospatial Data Models to Present User-Customized Universal Design Information

open access: yesFrontiers in Psychology, 2020
Environmental accessibility information measured by universal design guidelines does not exist in a form that can be effectively implemented as a geospatial database.
Sooyeon Rosie Han   +2 more
doaj   +1 more source

Food Security in Pakistan: Can It Be Achieved? [PDF]

open access: yes
Wide fluctuations in world prices of food-grains, especially rice and wheat, in the seventies and the early eighties forced many developing countries to strive for self-sufficiency in food-grain production. Pakistan is among the countries where near self-
Ather Maqsood Ahmed, Rehana Siddiqui
core  

Home - About - Disclaimer - Privacy