Universities as the Next Counterintelligence Battleground in Geopolitical Contests
ABSTRACT Globally, universities are increasingly becoming the target of foreign national security actors, engaging in espionage, sabotage, foreign interference and intellectual property theft. Despite that, there has been no examination of the utilisation of counterintelligence approaches by universities to the threats they face from the subordination ...
Brendan Walker‐Munro +1 more
wiley +1 more source
A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems. [PDF]
Zhang F, Xia X, Gao H, Ma Z, Chen X.
europepmc +1 more source
Has Australia lost control of its tobacco and nicotine markets?
Abstract Background Australia has adopted two policies that the World Health Organization (WHO) recommends as best practice for tobacco control: it has steeply increased tobacco taxes since 2010 and only allowed access to nicotine vapes for medical use.
Ron Borland +4 more
wiley +1 more source
UIGen: a hybrid framework for underwater image encryption based on evolutionary chaotic system and multi-domain transformation. [PDF]
Khokhar P, Bedi J, Batra S.
europepmc +1 more source
Abstract Background and aims The intentional use of psychoactive substances to enhance sexual experiences, known as chemsex, is associated with human immunodeficiency virus (HIV) transmission, psychological distress and social isolation among gay, bisexual and other men who have sex with men (GBMSM).
Nikolay Lunchenkov +3 more
wiley +1 more source
Secure electronic health record access control via blockchain, dual-attribute encryption, and large language model-based attribute extraction. [PDF]
Nekouie A +3 more
europepmc +1 more source
Who Makes the Far Right? Exploring Membership Application Data of the National Front of Australia
This paper addresses a problem for scholars examining the question of who supports far right political parties or movements. Due to the semi‐clandestine or oppositional nature of far right groups, historians, as well as those in adjacent disciplines, have often been unable to gain access to sufficient records or data to conduct analysis of who supports
Evan Smith, Lauren Pikó
wiley +1 more source
HCSS-GB and IBESS: Secret Image Sharing Schemes with Enhanced Shadow Management and Visual-Gradient Access Control. [PDF]
Pan H, Yan W, Wang R, Yu Y.
europepmc +1 more source
Midwives' Physiological Approach at the Third Stage of Labour: A Scoping Review
Midwives play a crucial role in supporting a physiological third stage of labour by balancing trust in the woman's body with safety measures to prevent postpartum haemorrhage. This scoping review identifies key midwifery practices that promote natural placenta and highlights the importance of undisturbed, woman‐centred care.
Elena Tarlazzi +9 more
wiley +1 more source
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source

