Results 151 to 160 of about 26,946 (315)
ABSTRACT Aim To evaluate the relationship between the Bröset Violence Checklist and additional risk factors identified in prior research by our team to determine which combination best predicted an emergency response to a violent incident in an emergency department. Design A prospective observational study was used to collect data about a single cohort
Elisa Ilarda +3 more
wiley +1 more source
How to Diagnose Prisons' Failures: Three Perspectives on Officers' Responsibilities
ABSTRACT Prison officers play a vital role in shaping prison conditions. Assessing their responsibility for, and potential role in reforming, the prison's failures is an urgent and important task in corrective justice efforts. This article takes up this task, with a focus on the US prison context, by applying and critically examining two general ...
Candice Delmas
wiley +1 more source
Abstract Recent decades have seen a significant rise in return and readmission frameworks. Scholars note a trend towards informalization, incentivization and Europeanization. Yet, no study has thoroughly evaluated with advanced regression techniques how the resulting frameworks impact migrant return and whether different types of frameworks affect ...
Ana Maria Torres Chedraui +3 more
wiley +1 more source
On Provable Security for Complex Systems
We investigate the contribution of cryptographic proofs of security to a systematic security engineering process. To this end we study how to model and prove security for concrete applications in three practical domains: computer networks, data outsourcing, and electronic voting.
openaire +3 more sources
Genes, fish and fisheries: translating science into policy
Abstract The 2024 Annual Symposium of the Fisheries Society of the British Isles reviewed the burgeoning impact of ‘omics’ technologies on fish ecology, management and forecasting. As with life sciences more generally, major advances in speed, cost‐effectiveness and breadth of applications in ‘omics’ has had profound societal and environmental impacts.
Gary R. Carvalho
wiley +1 more source
Efficiently non-authenticated group key management protocol withstand interruption attack
To overcome the fault that the interruption attack from internal participation of BD3 protocol, a new scheme was constructed by applying the bilinear map and had the provable security with tight reduction.
XU Peng1, CUI Guo-hua1, ZHENG Ming-hui2
doaj
Almost Uniform Density of Power Residues and the Provable Security of ESIGN [PDF]
Tatsuaki Okamoto, Jacques Stern
openalex +1 more source
Abstract Bodh Gaya, a small agrarian town in Bihar, India, is renowned as the cradle of Buddhism. The Mahabodhi Temple in Bodh Gaya was designated as a UNESCO World Heritage Site in 2002. Every year, millions of visitors come here to quench their spiritual thirst.
Ritika Rajput, Jian Pu
wiley +1 more source
New signcryption algorithm for secure communication of ad hoc networks
At first, a new identity based signcryption algorithm was proposed; its security and efficiency were analyzed. As a result, its provable security in the random oracle model is proved; compared with the previous identity based sign- cryption algorithms ...
ZHANG Chuan-rong1 +3 more
doaj

