Results 91 to 100 of about 1,527 (301)
Abstract Digital mental health services in Australia have grown rapidly since the COVID‐19 pandemic and continue to attract public and private investment. Yet, ambiguity remains about which regulatory bodies are responsible for addressing the ‘significant risks’ noted in Australia's National Safety and Quality Digital Mental Health Standards.
Piers Gooding, Grant Pink
wiley +1 more source
Edwards curves based security authentication protocol for mobile RFID systems
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG +3 more
doaj +2 more sources
Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security [PDF]
Eligijus Sakalauskas +2 more
openalex +1 more source
Towards provably secure efficiently searchable encryption [PDF]
Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.
openaire +2 more sources
Opportunities for the Labour Party: Football, Class and Community Renewal
Abstract This article argues that football represents an underutilised opportunity for the Labour Party to anchor a wider programme of civic renewal. In many working‐class communities, the decline of trade unions, working men's clubs and other associational spaces has eroded collective life, leaving football clubs as rare institutions where dignity ...
Sam Taylor Hill
wiley +1 more source
Linearly homomorphic aggregate signature secure in the standard model
Existing lattice-based linear homomorphic signature schemes have difficulty in balancing multi-user aggregation and provable security under the standard model, which limits their practical application in real-world distributed scenarios.
HAN Yiliang +4 more
doaj
Comment on "an Efficient Identity-Based Signature Scheme with Provable Security"
Syh‐Yuan Tan, Swee‐Huay Heng
openalex +1 more source
Provably Secure Cryptographic Constructions
Modern cryptography has virtually no provably secure constructions. Starting from the first Diffie–Hellman key agreement protocol (Diffie & Hellman, 1976) and the first public key cryptosystemRSA (Rivest et al., 1978), not a single public key cryptographic protocol has been proven secure. Note, however, that there exist secure secret key protocols, e.g.
openaire +3 more sources
Over the last 25 years, perceptions of the early prehistory of Northwest Africa have undergone radical changes due to new fieldwork projects and a corresponding growth in scientific interest in the region. Much of this work has been focused in Morocco, known for its extremely rich fossil and archaeological records in caves and rock shelters.
Nick Barton +3 more
wiley +1 more source
Recent years have seen landmark progress in our understanding of early Homo sapiens occupation of Europe, owing to new excavations and the application of new analytical methods. Research on British sites, however, continues to lag. This is because of limitations inherent in existing cave collections, and limited options for new fieldwork at known sites.
Robert Dinnis
wiley +1 more source

