Results 141 to 150 of about 26,946 (315)
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System [PDF]
Chun‐Ta Li +4 more
openalex +1 more source
Remote working and the new geography of local service spending
Abstract Remote working has rapidly become the new norm in many sectors, at least some of the time. Remote working changes where workers spend much of their time and the geographical location of demand, particularly for local personal services (LPS).
Gianni De Fraja +4 more
wiley +1 more source
A General Architecture for Multiserver Authentication Key Agreement with Provable Security [PDF]
Yunru Zhang +3 more
openalex +1 more source
Provably Secure Authenticated Encryption
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research of AE as a primitive in its own right started in 2000. The security goals of AE were captured in formal definitions in the tradition in the tradition of provable security (such as ...
openaire +2 more sources
Short Abstract This study evaluates ecological quality trends within the Jamuna River Basin, Bangladesh, from 2003 to 2023, using the Remote Sensing Ecological Index (RSEI) derived from Landsat imagery via Google Earth Engine (GEE). Results indicate varying ecological health, with Kurigram showing fluctuations, Sirajganj experiencing a steady decline ...
Md. Naimur Rahman +2 more
wiley +1 more source
What's coming out of those chimneys? Energy‐from‐waste incineration in Teesside, UK
Short Abstract This paper examines how Teesside's role in the UK's Net Zero Strategy facilitates ongoing industrial pollution through ‘green’ industrial projects like energy‐from‐waste incinerators. It critiques how narrow regulatory definitions of harm obscure the lived realities of environmental injustice for marginalised communities.
Jay Sinclair
wiley +1 more source
ABSTRACT Acknowledging the limitations of existing measurement instruments in adequately capturing the distinct cognitive processes (e.g., form‐focused vs. meaning‐focused) involved in informal digital learning of English (IDLE), this paper asserts a pressing need to develop and validate robust instruments that measure form‐focused and meaning‐focused ...
Minlin Zou +3 more
wiley +1 more source
Does Risk Matter? An Audit Risk Approach for Technology Adoption in Financial Audits
ABSTRACT Technology adoption models are widely applied to examine factors influencing the use of computer‐assisted audit techniques and tools (CAATTs). However, these models do not incorporate audit risk components and the risk‐based approach embedded in auditing standards, limiting their relevance to the auditing domain.
Alon Cohen, Jeffrey Kantor, Shalom Levy
wiley +1 more source

