Results 11 to 20 of about 119,685 (321)
REVOCATION OF ADMINISTRATIVE ACT [PDF]
Because the revocation is totally specific for administrative law principles, I chose to talk about in this study and its impact on the cancellation of administrative acts. Revocation will be explored, in terms of the authorities which it may provide but
MARTA CLAUDIA CLIZA
doaj +2 more sources
Labour productivity in state-owned enterprises [PDF]
In the aftermath of the Global and Financial Crisis (GFC), between 2013 and 2015, the Portuguese government revoked four holidays for both public sector and private employees.
Afonso, António +2 more
core +2 more sources
The Comparative Study of The Revocation of Donation in Iranian Law and The Draft European Union Civil Code (DCFR) [PDF]
< p >AbstractIn this study, attempts were made to understand the views of the two legal systems of Iran and the European Union on the revocation and feasibility of it in the donation. The purpose of this study, while familiarizing with the draft EU civil
Ali Taghizadeh, Sajjad Yavari
doaj +1 more source
Donee's ingratitude: How the judicial practice amended the legislation [PDF]
Although contracts are generally irrevocable, the donor may revoke the donation contract due to the donee's ingratitude. Such circumstances gives rise to an inevitable dispute between the contracting parties, which is commonly resolved in civil ...
Cvetković Mihajlo
doaj +1 more source
Formal Analysis of V2X Revocation Protocols [PDF]
Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy.
C Cremers +10 more
core +2 more sources
A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism
Establishing a session key (SSK) is very important for real-world deployment in open networks, which enables secure communication between remote parties.
Tung-Tso Tsai +4 more
doaj +1 more source
An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its ...
Fabio Sanvido +5 more
doaj +1 more source
A modular two‐step strategy provides tetraaza[n]helicenes (n = 7–15) as a homologous series with tunable photophysical and chiroptical properties. Extension beyond n = 11 induces pronounced through‐space π–π interactions, narrowing the energy gap and amplifying circularly polarized luminescence.
Takashi Otani +6 more
wiley +2 more sources
Certificate Transparency with Enhancements and Short Proofs [PDF]
Browsers can detect malicious websites that are provisioned with forged or fake TLS/SSL certificates. However, they are not so good at detecting malicious websites if they are provisioned with mistakenly issued certificates or certificates that have been
Brown, André EX +11 more
core +7 more sources
This minireview highlights recent advances in catalyst development and mechanistic strategies that enable photochemical and photocatalytic reactivity under 700–1000 nm NIR light, emphasizing how long‐wavelength excitation expands opportunities in both synthetic chemistry and biology.
Santosh K. Pagire +3 more
wiley +2 more sources

