Results 51 to 60 of about 3,148 (188)

Abortion, incommunicability, and semiotic labor: Policing disciplinary boundaries through language ideological work among emergency nurses in a post‐Roe environment

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract Nurses working in emergency departments in the United States are increasingly managing obstetric emergencies, yet they receive no guidance from hospital administrators about how to adapt this care to the abortion bans that have recently become law in many states.
Lynnette Arnold   +2 more
wiley   +1 more source

Novel Schemes for Authentication [PDF]

open access: yes, 2013
Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual.
Gupta, Vikash Kumar
core  

Algorithm Diversity for Resilient Systems

open access: yes, 2019
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis   +10 more
core   +1 more source

Collusion defender : preserving subscribers’ privacy in publish and subscribe systems [PDF]

open access: yes, 2019
The Publish and Subscribe (pub/sub) system is an established paradigm to disseminate the data from publishers to subscribers in a loosely coupled manner using a network of dedicated brokers.
Asghar, MR   +4 more
core   +2 more sources

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Notes on a lattice-based proxy-oriented identity-based encryption with keyword search [PDF]

open access: yes, 2021
Zhang et al. recently proposed a lattice-based proxy-oriented identity-based encryption with keyword search (PO-IBEKS) at Information Sciences in 2019. They claimed that their scheme can resist insider keyword guessing attacks by preventing cloud server ...
Cheng-Yi Lee   +3 more
core  

Agents' Behavior and Interest Rate Model Optimization in DeFi Lending

open access: yesMathematical Finance, Volume 36, Issue 2, Page 374-396, April 2026.
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci   +4 more
wiley   +1 more source

‘PULSE FICTION’: Development of Slightly Processed Pulse‐Based Foods and Recipes to Meet the Needs of Consumers and the Agricultural Sector and Improve Food Sustainability

open access: yesNutrition Bulletin, Volume 51, Issue 1, Page 104-119, March 2026.
ABSTRACT Pulses offer significant nutritional and environmental benefits and are useful components of healthier, more sustainable diets and global food security. However, their consumption in France remains low and below the world average. Farmers face economic and technical challenges in diversifying crops, and current domestic production is ...
Gaëlle Arvisenet   +7 more
wiley   +1 more source

A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city

open access: yesDigital Communications and Networks
Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data.
Hongjun Li   +4 more
doaj   +1 more source

Developing a structured framework to explore the experiences of people with dementia and their caregivers regarding non‐pharmacological sleep interventions

open access: yesAlzheimer's &Dementia, Volume 22, Issue 2, February 2026.
Abstract INTRODUCTION This paper presents the development of a framework to assess the use and experiences of non‐pharmacological interventions (NPIs) supporting sleep, including technological and indoor environmental quality (IEQ) measures. Sleep disturbances are common in people with dementia (PwD) and increase caregiver burden.
CAM Huisman, MGLC Loomans, HSM Kort
wiley   +1 more source

Home - About - Disclaimer - Privacy