Results 131 to 140 of about 319,858 (317)
“Who's breaking the law … not us, them!”: Inside immigration detention in Portugal
Abstract In this paper, we examine immigration detention in Portugal, a system whose daily operations and inherent violence are overlooked in both public and academic discourses. Even within community psychology, discussions on immigration detention have largely remained on the fringes of scholarly debates. Guided by a justice‐centered ecological lens,
Francesca Esposito+3 more
wiley +1 more source
Intimate partner violence is a major problem in Australia, impacting many families that are on the cusp of disruption and intervention by the child protection system. Using an innovative method of inquiry, the article explores the role of dedicated men's workers in a South Australian non‐government organisation's intensive family service that works ...
Alex Haines+10 more
wiley +1 more source
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Classic McEliece is one of the three code-based candidates in the fourth round of the NIST post-quantum cryptography standardization process in the Key Encapsulation Mechanism category. As such, its decapsulation algorithm is used to recover the session
Vlad-Florin Drăgoi+4 more
doaj +1 more source
Abstract In the U.S., crime and violence are concentrated in cities that have lost industry and population due to economic disinvestment and structurally racist policies. Researchers, practitioners, and policymakers have called for community‐level approaches that reduce violence in these cities by improving unsafe physical environments, increasing ...
Laney A. Rupp+9 more
wiley +1 more source
The COVID‐19 pandemic led to a backlog of filtration material for N95 Filtering Facepiece Respirators (FFRs). An alternative face mask filter material is presented, consisting of an unsupported, nonwoven layer of uncharged polystyrene microfibers. This microfiber material meets NIOSH N95 FFR filtration and breathability requirements, demonstrates ...
Madeline G. Jensen+12 more
wiley +1 more source
The Private Key Capacity Region for Three Terminals [PDF]
We consider a model with three terminals and examine the problem of characterizing the largest rates at which two pairs of terminals can simultaneously generate private keys, each of which is effectively concealed from the remaining terminal.
arxiv
Abstract Intergenerational connectedness broadly encompasses relations among humans, lands, and all living and spiritual beings, and functions as an important part of Indigenous well‐being. Many public health campaigns and interventions aim to promote connectedness to support holistic wellness and reduce health inequities. Currently, however, there are
Victoria M. O'Keefe+13 more
wiley +1 more source
Wage arbitrage through skilled emigration: Evidence from the Pacific Islands
Abstract Skilled workers in poor countries earn wages a fraction of that of their counterparts in rich nations. Here, we estimate the opportunities for wage arbitrage from emigration of workers from the Pacific Islands into Australia and New Zealand. Our calculations, based on wages earned by graduate accountants, computer science graduates and cooks ...
Satish Chand+2 more
wiley +1 more source
Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography.
Aryanti Aryanti, Mekongga Ikhthison
doaj +1 more source
Bit-oriented quantum public-key encryption [PDF]
We propose a bit-oriented quantum public-key scheme which uses Boolean function as private-key and randomly changed pairs of quantum state and classical string as public-keys. Contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys.
arxiv