Results 111 to 120 of about 26,946 (315)
STREETS AS STAGES: Traffic Enforcement and the Competition for Cultural Growth in China
ABSTRACT In keeping with China’s desire to build soft power to parallel its economic growth, the policing of city streets has moved to the forefront as a mechanism for moral regulation and improving urban prestige. Under pressure to civilize their citizenry, many Chinese cities have become entrepreneurial cities within a type of cultural growth ...
Gregory Fayard
wiley +1 more source
Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks [PDF]
Ju-Sung Kang +5 more
openalex +1 more source
A Survey of Provably Secure Searchable Encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS). Since the pioneering work of Song, Wagner, and Perrig (IEEE S&P '00), the field of provably secure SE has ...
Andreas Peter +3 more
openaire +3 more sources
Abstract Research Summary This qualitative study examines how frontline police officers in British Columbia experienced and adapted to Canada's first formal drug decriminalization policy 1 year after implementation. Drawing on 30 semi‐structured interviews and using thematic analysis with a policy alienation and street‐level bureaucracy lens, we ...
Sarah Ferencz +2 more
wiley +1 more source
Australia and the Path Not Taken: The Declining Independence and Influence of Middle Powers
ABSTRACT Australian foreign policy has famously been distinguished by the search for ‘great and powerful friends’. However, Australia's relationship with its current notional protector and key ally—the United States—has generally had more costs than benefits and, I argue, has consequently not been in Australia's much‐invoked ‘national interest ...
Mark Beeson
wiley +1 more source
Edwards curves based security authentication protocol for mobile RFID systems
Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the
Yu-long YANG +3 more
doaj +2 more sources
ABSTRACT This paper examined the critical challenges facing the international monetary system, arguing that they have created conditions for a shift from a neoliberal framework to a pluralist multipolar financial order. Using an interdisciplinary approach that blends international law and international relations, the paper provides an analysis of the ...
Jiangyu Wang
wiley +1 more source
Towards provable security for ad hoc routing protocols [PDF]
Levente Buttyán, István Vajda
openalex +1 more source
ABSTRACT We conduct a systematic empirical investigation into the consistency of competing industry‐level total factor productivity (TFP) series in the United States, including the crop and animal production or farm sector. We apply an algorithm based on time‐series methods to three widely‐used databases frequently utilized by researchers to study ...
Sergio H. Lence, Alejandro Plastina
wiley +1 more source
Natural differential privacy-a perspective on protection guarantees. [PDF]
Altman M, Cohen A.
europepmc +1 more source

