Results 41 to 50 of about 3,665 (174)

Exploring Frequency Reports as Described by Judges in Timely and Delayed Canadian Child Sexual Abuse Cases

open access: yesApplied Cognitive Psychology, Volume 40, Issue 3, May/June 2026.
ABSTRACT Child sexual abuse (CSA) cases can involve multiple similar incidents over a long duration. Complainants can either report the offence shortly after it occurs, leading to a brief delay between the end of the abuse and court hearing (timely delay; CSA) or the court hearing takes place 2 or more years after its occurrence (delayed; historical ...
Fiza Hasan   +2 more
wiley   +1 more source

A simplistic approach to keyhole plan recognition [PDF]

open access: yes, 1995
When applying plan recognition to Human - Computer Interaction, one must cope with users exhibiting a large amount of reactive behaviour: users that change tasks, or change strategies for achieving tasks.
Stenborg, Ola, Waern, Annika
core   +1 more source

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]

open access: yes, 2014
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi   +3 more
core   +1 more source

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

Privacy-Preserving Genetic Relatedness Test [PDF]

open access: yes, 2016
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano   +2 more
core   +1 more source

Abortion, incommunicability, and semiotic labor: Policing disciplinary boundaries through language ideological work among emergency nurses in a post‐Roe environment

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract Nurses working in emergency departments in the United States are increasingly managing obstetric emergencies, yet they receive no guidance from hospital administrators about how to adapt this care to the abortion bans that have recently become law in many states.
Lynnette Arnold   +2 more
wiley   +1 more source

Algorithm Diversity for Resilient Systems

open access: yes, 2019
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis   +10 more
core   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”

open access: yesIEEE Access
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan   +3 more
doaj   +1 more source

Kriptanalisis Algoritma Vigenere Chiper dengan Algoritma Genetika untuk Penentuan Kata Kunci

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2018
Cryptanalysis is the art to solve without key ciphers, in contrast to cryptography, namely to maintain the confidentiality of data by encode a plaintext. Vigenere ciphers is one of the kriptanalisis algorithm.
Tsuraya Ats Tsauri, Nurochman Nurochman
doaj   +1 more source

Home - About - Disclaimer - Privacy