Results 51 to 60 of about 956 (257)

The Distributive Consequences of Active Welfare Policies in Europe

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT This article examines the distributive consequences of active welfare policies in Europe by analysing tier‐specific investments in individualised employment services across four European welfare states: Denmark, Germany, the Netherlands and the United Kingdom.
Deborah Jackwerth‐Rice   +1 more
wiley   +1 more source

Practical Provably Secure Flooding for Blockchains

open access: yes, 2022
Advances in Cryptology – ASIACRYPT ...
Chen-Da Liu-Zhang   +4 more
openaire   +3 more sources

Recent advances in multifunctional soft robots: A materials–structures–systems co‐design perspective for synergistic integration

open access: yesFlexMat, EarlyView.
Abstract Soft robots, engineered from highly compliant materials, offer superior adaptability and safety in unstructured environments compared to their rigid counterparts. Recent advancements, fueled by bio‐inspiration and material programmability, have led to the rapid co‐evolution of their core modules: actuation, sensing, protection, energy, and ...
Qiulei Liu   +3 more
wiley   +1 more source

Sustainable Work and Employment in Social Care: New Challenges, New Priorities

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Human Resource Management (HRM) research focused on social care is sparse. This gap is surprising given the scale of the social care workforce in many countries, its vital role in meeting the increasingly complex needs of vulnerable community groups, and the persistent challenges in recruiting and retaining staff.
Ian Kessler   +4 more
wiley   +1 more source

Provable security signcryption scheme based on RLWE without trapdoor

open access: yesTongxin xuebao, 2020
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU   +3 more
doaj   +2 more sources

What Can K–12 Education Teach College Professors?

open access: yes
The Bulletin of the Ecological Society of America, EarlyView.
Michael P. Marchetti
wiley   +1 more source

Targeting Microbiome Metabolites: Reshaping Immunotherapy and Clinical Management Strategies for Colorectal Cancer

open access: yesiMetaMed, EarlyView.
The occurrence and progression of colorectal cancer are intricately linked to metabolites produced by the gut microbiota. Metabolites generated by pathogenic microbial communities can promote colorectal cancer development by reshaping the immune microenvironment.
Xinrui Yang   +3 more
wiley   +1 more source

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud

open access: yesIEEE Access, 2019
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao   +3 more
doaj   +1 more source

"Two tribes": Handaxe shape variation shows distinct regional cultural groups in southeastern Britain between 424 000 and 374 000 BP

open access: yesJournal of Quaternary Science, EarlyView.
ABSTRACT This paper examines regional and chronological variations in Acheulean handaxe morphology during Marine Isotope Stage 11 (c. 425–365 ka BP) in Britain. Using a data set of 737 handaxes from 13 securely dated sites in East Anglia and the Thames Valley, we apply three‐dimensional geometric morphometric analysis to examine morphological ...
Mark White   +5 more
wiley   +1 more source

A Secure and Efficient Handover Authentication Protocol for Wireless Networks

open access: yesSensors, 2014
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security
Weijia Wang, Lei Hu
doaj   +1 more source

Home - About - Disclaimer - Privacy