Results 91 to 100 of about 1,527 (301)

Regulating digital mental health services in Australia: Strengthening oversight and clarifying complaints mechanisms

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Digital mental health services in Australia have grown rapidly since the COVID‐19 pandemic and continue to attract public and private investment. Yet, ambiguity remains about which regulatory bodies are responsible for addressing the ‘significant risks’ noted in Australia's National Safety and Quality Digital Mental Health Standards.
Piers Gooding, Grant Pink
wiley   +1 more source

Edwards curves based security authentication protocol for mobile RFID systems

open access: yesTongxin xuebao, 2014
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG   +3 more
doaj   +2 more sources

Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security [PDF]

open access: gold, 2017
Eligijus Sakalauskas   +2 more
openalex   +1 more source

Towards provably secure efficiently searchable encryption [PDF]

open access: yes, 2012
Traditional encryption systems are designed in such a way that either the whole data is decrypted, if the encryption and decryption keys match, or nothing is decrypted otherwise. However, there are applications that require a more flexible encryption system which supports decrypting data partially.
openaire   +2 more sources

Opportunities for the Labour Party: Football, Class and Community Renewal

open access: yesThe Political Quarterly, EarlyView.
Abstract This article argues that football represents an underutilised opportunity for the Labour Party to anchor a wider programme of civic renewal. In many working‐class communities, the decline of trade unions, working men's clubs and other associational spaces has eroded collective life, leaving football clubs as rare institutions where dignity ...
Sam Taylor Hill
wiley   +1 more source

Linearly homomorphic aggregate signature secure in the standard model

open access: yesTongxin xuebao
Existing lattice-based linear homomorphic signature schemes have difficulty in balancing multi-user aggregation and provable security under the standard model, which limits their practical application in real-world distributed scenarios.
HAN Yiliang   +4 more
doaj  

Provably Secure Cryptographic Constructions

open access: yes, 2012
Modern cryptography has virtually no provably secure constructions. Starting from the first Diffie–Hellman key agreement protocol (Diffie & Hellman, 1976) and the first public key cryptosystemRSA (Rivest et al., 1978), not a single public key cryptographic protocol has been proven secure. Note, however, that there exist secure secret key protocols, e.g.
openaire   +3 more sources

A reappraisal of the Middle to Later Stone Age prehistory of Morocco Réévaluer la préhistoire du Maroc, du Middle Stone Age au Later Stone Age

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
Over the last 25 years, perceptions of the early prehistory of Northwest Africa have undergone radical changes due to new fieldwork projects and a corresponding growth in scientific interest in the region. Much of this work has been focused in Morocco, known for its extremely rich fossil and archaeological records in caves and rock shelters.
Nick Barton   +3 more
wiley   +1 more source

The Early Upper Palaeolithic in British caves: problems and potential Le Paléolithique supérieur ancien dans les grottes de Grande‐Bretagne : problèmes et potentiels

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
Recent years have seen landmark progress in our understanding of early Homo sapiens occupation of Europe, owing to new excavations and the application of new analytical methods. Research on British sites, however, continues to lag. This is because of limitations inherent in existing cave collections, and limited options for new fieldwork at known sites.
Robert Dinnis
wiley   +1 more source

Home - About - Disclaimer - Privacy