Results 131 to 140 of about 26,946 (315)
Scaling area‐based conservation, including initiatives led or comanaged by Indigenous Peoples and local communities, is a flagship goal of the Kunming‐Montreal Global Biodiversity Framework. Conservationists often aspire to scale initiatives, but this is rarely achieved in practice. Identifying and addressing factors that limit initiative adoption (i.e.
Thomas Pienkowski +39 more
wiley +1 more source
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals
Ivan Damgård
openalex +1 more source
Towards Provable Security of Substitution-Permutation Encryption Networks
Zhi -Guo Chen, S.E. Tavares
openalex +1 more source
New Approach towards Generalizing Feistel Networks and Its Provable Security [PDF]
Jiajie Liu, Bing Sun, Chao Li
openalex +1 more source
Global Interdependence, Just Vaccine Allocation, and Compensatory Justice: A New Model
ABSTRACT During the COVID‐19 pandemic, numerous models were offered for how scarce vaccine resources should be distributed. Proposed vaccine distribution models generally were divided between nationalist models, which give preference to nationals, and cosmopolitan models, which ignore national boundaries.
Kalen J. Fredette
wiley +1 more source
Abstract Aims Ulotaront is an investigational trace amine‐associated receptor 1 (TAAR1) agonist demonstrated to slow gastric emptying in schizophrenia patients with metabolic syndrome (MetSyn) and prediabetes type 2. Here we evaluate the effects of ulotaront on glucose‐insulin dynamics in schizophrenia patients with MetSyn and prediabetes.
Snezana Milanovic +10 more
wiley +1 more source
Provable secure digital watermarking scheme
A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work
doaj +2 more sources
Provably secure secret sharing scheme based on bilinear maps
A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the ...
LI Hui-xian1, PANG Liao-jun2
doaj +2 more sources

