Results 41 to 50 of about 3,665 (174)
ABSTRACT Child sexual abuse (CSA) cases can involve multiple similar incidents over a long duration. Complainants can either report the offence shortly after it occurs, leading to a brief delay between the end of the abuse and court hearing (timely delay; CSA) or the court hearing takes place 2 or more years after its occurrence (delayed; historical ...
Fiza Hasan +2 more
wiley +1 more source
A simplistic approach to keyhole plan recognition [PDF]
When applying plan recognition to Human - Computer Interaction, one must cope with users exhibiting a large amount of reactive behaviour: users that change tasks, or change strategies for achieving tasks.
Stenborg, Ola, Waern, Annika
core +1 more source
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi +3 more
core +1 more source
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source
Abstract Nurses working in emergency departments in the United States are increasingly managing obstetric emergencies, yet they receive no guidance from hospital administrators about how to adapt this care to the abortion bans that have recently become law in many states.
Lynnette Arnold +2 more
wiley +1 more source
Algorithm Diversity for Resilient Systems
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis +10 more
core +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan +3 more
doaj +1 more source
Kriptanalisis Algoritma Vigenere Chiper dengan Algoritma Genetika untuk Penentuan Kata Kunci
Cryptanalysis is the art to solve without key ciphers, in contrast to cryptography, namely to maintain the confidentiality of data by encode a plaintext. Vigenere ciphers is one of the kriptanalisis algorithm.
Tsuraya Ats Tsauri, Nurochman Nurochman
doaj +1 more source

