Results 81 to 90 of about 4,138,516 (290)

ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny

open access: yesIACR Transactions on Symmetric Cryptology, 2018
We study possible alternatives for ShiftRows to be used as cell permutations in AES-like ciphers. As observed during the design process of the block cipher Midori, when using a matrix with a non-optimal branch number for the MixColumns operation, the ...
Gianira N. Alfarano   +4 more
doaj   +1 more source

Food Security in Pakistan: Can It Be Achieved? [PDF]

open access: yes
Wide fluctuations in world prices of food-grains, especially rice and wheat, in the seventies and the early eighties forced many developing countries to strive for self-sufficiency in food-grain production. Pakistan is among the countries where near self-
Ather Maqsood Ahmed, Rehana Siddiqui
core  

Trust economics feasibility study [PDF]

open access: yes, 2008
We believe that enterprises and other organisations currently lack sophisticated methods and tools to determine if and how IT changes should be introduced in an organisation, such that objective, measurable goals are met.
Coles, R   +7 more
core  

New Onset of Fibromyalgia After Exposure to a Combat Environment: A Longitudinal Cohort Study

open access: yesArthritis Care &Research, EarlyView.
Objective Traumatic life events are hypothesized to be triggers for the onset of fibromyalgia. Posttraumatic stress disorder (PTSD) is a common comorbidity of fibromyalgia. However, limited prospective data are available on the development of fibromyalgia after exposure to high‐magnitude stress.
Jay B. Higgs   +15 more
wiley   +1 more source

Security of Supply for Natural Gas Markets. What is it and What is it not? [PDF]

open access: yes
The issue of security of gas supplies is frequently discussed on the basis of intuitive and non-systematic arguments. Greater import dependence is normally equated with greater insecurity, and strategic stocks are the risk management tool most commonly ...
Giacomo Luciani
core  

Securing EU neighborhood - an ideational approach to EU-neighborhood relations [PDF]

open access: yes, 2011
This paper analyses the interrelationship between internal and external security discourses in the field of European Union's neighbourhood policy. The European Union can be observed to actively use security concepts developed in the internal policy-field
Dib, Laura
core  

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

Prevalence of Systemic Lupus Erythematosus in Australia, 2010–2022: A Population‐Based Study Using Linked National Administrative Health Data

open access: yesArthritis Care &Research, Accepted Article.
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper   +7 more
wiley   +1 more source

Secure Scrum: Development of Secure Software with Scrum

open access: yes, 2015
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core  

Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors [PDF]

open access: yes, 2018
Employees continue to be the weak link in organizational security management and efforts to improve the security of employee behaviors have not been as effective as hoped.
Goel, Sanjay   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy