Results 81 to 90 of about 22,366 (192)
‘Don't send us a cake, and then let us drown again’: remembering and forgetting Cyclone Gabrielle
ABSTRACT We present a critical analysis of news coverage during the one‐year anniversary of Cyclone Gabrielle in Aotearoa New Zealand. This disaster raised important questions surrounding emergency preparedness, infrastructural vulnerability, climate change, adaptation, future land‐use policies and managed retreat.
Luke Goode +4 more
wiley +1 more source
ABSTRACT Introduction While the recovery approach is gaining recognition in non‐Western countries, it remains underexplored in Southeast Asia. This study addressed this gap by examining how health professionals and students conceptualised recovery, providing insights for enhancing mental health practices.
Rinlita Chatwiriyaphong +4 more
wiley +1 more source
Abstract Iatrogenic hypoglycaemia remains a major barrier in diabetes care. Over time, and with repeated hypoglycaemic episodes, the physiological responses to hypoglycaemia can become blunted, resulting in impaired awareness of hypoglycaemia (IAH). In IAH, the onset of cognitive dysfunction precedes the onset of autonomic symptoms, often preventing ...
Simon A. Berry +5 more
wiley +1 more source
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F. +6 more
core
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan +3 more
doaj +1 more source
The Network’s Data Security Risk Analysis [PDF]
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core
Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly +2 more
doaj +1 more source
The Costs of Deception: Evidence From Psychology [PDF]
Recently, it has been argued that the evidence in social science research suggests that deceiving subjects in an experiment does not lead to a significant loss of experimental control.
Andreas Ortmann, Ralph Hertwig
core
Attribute-based multi-user collaborative searchable encryption in COVID-19. [PDF]
Zhao F +5 more
europepmc +1 more source

