Results 61 to 70 of about 319,858 (317)

Attitudes and beliefs about family and domestic violence in faith‐based communities: An exploratory qualitative study

open access: yesAustralian Journal of Social Issues, Volume 57, Issue 4, Page 880-897, December 2022., 2022
Abstract Family and domestic violence (FDV) is a major social, economic and health issue that is associated with a range of physical, mental and behavioural health outcomes. Religion and faith are powerful and influential in shaping the lives of many individuals and societies, in addition to the social practices, norms and structures that are ...
Mandy Truong   +5 more
wiley   +1 more source

Associations of Cerebrospinal Fluid Orexin‐A, Alzheimer Disease Biomarkers, and Cognitive Performance

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACTObjectiveCerebrospinal fluid (CSF) orexin‐A has been suggested to be a biomarker of Alzheimer disease (AD). In both cognitively unimpaired healthy older adults and individuals with symptomatic AD, CSF orexin‐A is positively associated with CSF Aβ42, p‐tau181, and total tau (t‐tau) concentrations.
Ruijin Lu   +13 more
wiley   +1 more source

A population‐based study of homelessness, antisocial behaviour and violence victimisation among young adults in Victoria, Australia

open access: yesAustralian Journal of Social Issues, Volume 57, Issue 4, Page 762-782, December 2022., 2022
Abstract Homeless young adults are at increased risk for contact with the police and are overrepresented in the justice system. This study explored associations between homelessness, antisocial behaviour and violence victimisation using longitudinal panel data gathered through young adulthood.
Jessica A. Heerde   +3 more
wiley   +1 more source

One-Time Certificates for Reliable and Secure Document Signing [PDF]

open access: yesarXiv, 2022
Electronic documents are signed using private keys and verified using the corresponding digital certificates through the well-known public key infrastructure model. Private keys must be kept in a safe container so they can be reused. This makes private key management a critical component of public key infrastructures with no failproof answer. Therefore,
arxiv  

Decoherence-full subsystems and the cryptographic power of a private shared reference frame [PDF]

open access: yesPhys. Rev. A 70, 032307 (2004), 2004
We show that private shared reference frames can be used to perform private quantum and private classical communication over a public quantum channel. Such frames constitute a novel type of private shared correlation (distinct from private classical keys or shared entanglement) useful for cryptography. We present optimally efficient schemes for private
arxiv   +1 more source

Unleashing the Power of Multiomics: Unraveling the Molecular Landscape of Peripheral Neuropathy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Peripheral neuropathies (PNs) affect over 20 million individuals in the United States, manifesting as a wide range of sensory, motor, and autonomic nerve symptoms. While various conditions such as diabetes, metabolic disorders, trauma, autoimmune disease, and chemotherapy‐induced neurotoxicity have been linked to PN, approximately one‐third of
Julie Choi   +7 more
wiley   +1 more source

Making homes more accessible for people with mobility impairment: A lived experience perspective

open access: yesAustralian Journal of Social Issues, Volume 57, Issue 4, Page 956-969, December 2022., 2022
Abstract People with mobility impairment have the right to live in accessible housing that meets their needs. Although the Australian National Construction Code for residential housing will be amended to include minimum accessibility standards in September 2022, some states have chosen not to adopt these standards (New South Wales, Western Australia ...
Isabella Goodwin   +7 more
wiley   +1 more source

Quantum BER estimation modelling and analysis for satellite‐based quantum key distribution scenarios

open access: yesIET Quantum Communication
The quantum communication channel is considered to be eavesdropped when the signal Quantum Bit Error Rate (QBER) exceeds a defined theoretical limit and is thus considered a figure of merit parameter for assessing the security of a quantum channel.
Abhishek Khanna   +3 more
doaj   +1 more source

Improving the security of LSB image steganography

open access: yesJOIV: International Journal on Informatics Visualization, 2019
Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method.
Jamil Al-Azzeh   +3 more
doaj   +1 more source

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages

open access: yesApplied Sciences, 2020
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC).
ByeongGyu Park   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy