Results 81 to 90 of about 4,138,516 (290)
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny
We study possible alternatives for ShiftRows to be used as cell permutations in AES-like ciphers. As observed during the design process of the block cipher Midori, when using a matrix with a non-optimal branch number for the MixColumns operation, the ...
Gianira N. Alfarano +4 more
doaj +1 more source
Food Security in Pakistan: Can It Be Achieved? [PDF]
Wide fluctuations in world prices of food-grains, especially rice and wheat, in the seventies and the early eighties forced many developing countries to strive for self-sufficiency in food-grain production. Pakistan is among the countries where near self-
Ather Maqsood Ahmed, Rehana Siddiqui
core
Trust economics feasibility study [PDF]
We believe that enterprises and other organisations currently lack sophisticated methods and tools to determine if and how IT changes should be introduced in an organisation, such that objective, measurable goals are met.
Coles, R +7 more
core
New Onset of Fibromyalgia After Exposure to a Combat Environment: A Longitudinal Cohort Study
Objective Traumatic life events are hypothesized to be triggers for the onset of fibromyalgia. Posttraumatic stress disorder (PTSD) is a common comorbidity of fibromyalgia. However, limited prospective data are available on the development of fibromyalgia after exposure to high‐magnitude stress.
Jay B. Higgs +15 more
wiley +1 more source
Security of Supply for Natural Gas Markets. What is it and What is it not? [PDF]
The issue of security of gas supplies is frequently discussed on the basis of intuitive and non-systematic arguments. Greater import dependence is normally equated with greater insecurity, and strategic stocks are the risk management tool most commonly ...
Giacomo Luciani
core
Securing EU neighborhood - an ideational approach to EU-neighborhood relations [PDF]
This paper analyses the interrelationship between internal and external security discourses in the field of European Union's neighbourhood policy. The European Union can be observed to actively use security concepts developed in the internal policy-field
Dib, Laura
core
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier +12 more
wiley +1 more source
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper +7 more
wiley +1 more source
Secure Scrum: Development of Secure Software with Scrum
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core
Are we predisposed to behave securely? Influence of risk disposition on individual security behaviors [PDF]
Employees continue to be the weak link in organizational security management and efforts to improve the security of employee behaviors have not been as effective as hoped.
Goel, Sanjay +3 more
core +3 more sources

