Results 131 to 140 of about 80,615 (252)

How Smart is your Android Smartphone? [PDF]

open access: yes, 2010
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers.
Mulani, Deepika
core   +3 more sources

Selecting Immigrants by Skill and Global Inequality

open access: yes
Journal of Social Philosophy, EarlyView.
Rufaida Al Hashmi
wiley   +1 more source

Understanding landowners' preferences to participate in tropical mountain forest restoration

open access: yesRestoration Ecology, EarlyView.
Abstract Introduction The restoration of degraded tropical forests is a promising strategy to mitigate the climate and biodiversity crises. Across the globe large areas have the potential to be restored through multiplying small‐scale initiatives implemented by landowners working at local scales.
Esteban A. Guevara   +5 more
wiley   +1 more source

Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2

open access: yesWasit Journal of Engineering Sciences
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj   +1 more source

Voting using Java Card smart cards: A case study [PDF]

open access: yes, 2002
Contains fulltext : 176130.pdf (Author’s version preprint ) (Open Access)
Breunesse, C.-B.   +2 more
openaire  

Learned Family on the Educator‐Kibbutzim—Knowledge, Kinship, and Social Transformation as Historical Legacy

open access: yesAnthropology &Education Quarterly, Volume 57, Issue 2, June 2026.
ABSTRACT This article explores how educator‐kibbutzim recruit socialist‐Zionist learning traditions to construct new forms of kinship. Bringing communities of practice theory to new kinship studies, we expand on the role of knowledge in bridging the social/biological.
Lauren Erdreich, Rotem Bar Israel
wiley   +1 more source

Reasoning about Card Tears and Transactions in Java Card [PDF]

open access: yes, 2003
Contains fulltext : 112478.pdf (Publisher’s version ) (Open Access)
Hubbers, E.M.G.M., Poll, E.
openaire  

An asynchronous java processor for smart card. [PDF]

open access: yes, 2003
Yu Chun-Pong.Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.Includes bibliographical references (leaves 60-61).Abstracts in English and Chinese.Abstract of this thesis entitled: --- p.i摘要 --- p.iiiAcknowledgements --- p.ivTable of contents ---

core  

Decolonizing infant mental health: Black maternal mental health decision‐making

open access: yesInfant Mental Health Journal: Infancy and Early Childhood, Volume 47, Issue 3, May 2026.
Abstract Over the last three decades (and maybe longer), studies have documented persistent race‐based maternal mental health disparities, whereas Black mothers are more likely to experience mental health concerns, and least likely to access formal mental health services due to structural racism and other social determinants.
Amittia Parker
wiley   +1 more source

Expanding the Methodological Repertoire in Institutional Ethnography: A Design Sociology Approach to Mapping and Visualizing Invisible Work

open access: yesCanadian Review of Sociology/Revue canadienne de sociologie, Volume 63, Issue 2, May 2026.
ABSTRACT This article presents a novel methodological approach in which institutional ethnography borrows from design sociology. Although mapping is a core component of institutional ethnography, previous research highlights opportunities to further develop mapping techniques as both an analytical tool and a means of presenting research findings ...
Anna Isaksson
wiley   +1 more source

Home - About - Disclaimer - Privacy