Results 241 to 250 of about 175,312 (289)
Some of the next articles are maybe not open access.
Bank Secrecy (A Comparative Study)
Al-Kitab Journal for Human Sciences, 2023Banks usually work to protect the secrets of their customers in order to protect the credit and it is not permissible to disclose these secrets but only in certain cases for the benefit of the credit or in exceptional cases estimated by law. The present study sheds light on the trends of comparative legislation on the protection of bank secrecy between
openaire +1 more source
An Experimental Study of TLS Forward Secrecy Deployments
IEEE Internet Computing, 2014Many Transport Layer Security (TLS) servers use the ephemeral Diffie-Hellman (DHE) key exchange to support forward secrecy. However, in a survey of 473,802 TLS servers, the authors found that 82.9 percent of the DHE-enabled servers use weak DH parameters, resulting in a false sense of security. They compared the server throughput of various TLS setups,
Lin-Shung Huang +3 more
openaire +1 more source
2021
Abstract Chapter 2 describes the book’s approach to studying networked silence and how people strategically hide their beliefs in some contexts and not in others. It provides details about how the author found CWG, how she gained access to individual members and their meetings, and how she built relationships with members and earned ...
openaire +1 more source
Abstract Chapter 2 describes the book’s approach to studying networked silence and how people strategically hide their beliefs in some contexts and not in others. It provides details about how the author found CWG, how she gained access to individual members and their meetings, and how she built relationships with members and earned ...
openaire +1 more source
A prospective study of donor insemination recipients: secrecy, privacy, and disclosure
Fertility and Sterility, 1994To study prospectively the attitudes and behaviors of heterosexual couples undergoing donor insemination.Couples undergoing donor insemination completed psychological questionnaires before treatment regarding psychiatric symptoms, self-esteem, marital adjustment, and their attitudes about privacy or disclosure.Forty-one of 82 heterosexual couples ...
S C, Klock, M C, Jacob, D, Maier
openaire +2 more sources
Exact secrecy throughput capacity study in mobile ad hoc networks
Ad Hoc Networks, 2018Abstract The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite much work on the scaling law results of MANET STC, the exact STC study of such networks remains an open problem.
Xiaochen Li +4 more
openaire +1 more source
Pay Secrecy versus Pay Disclosure for Salesmen: A Longitudinal Study
Journal of Marketing Research, 1978On the basis of a “before-after with control group” experimental design, empirical evidence is provided that shows the amount of information disclosed about pay had a major impact on salesmen's performance and job satisfaction.
Charles M. Futrell, Omer C. Jenkins
openaire +1 more source
Analyst Coverage, Corruption and Financial Secrecy: A Multi-Country Study
SSRN Electronic Journal, 2015This study extends the literature on analyst coverage by examining the impact of both the experience of corruption at country-level and firm actions to prevent corruption on analyst coverage. It also extends the literature on analyst coverage by examining the effect of financial secrecy at country-level on the number of analysts following a firm, using
Omaima A. G. Hassan, Gianluigi Giorgioni
openaire +1 more source
Case Study: Openness and Secrecy in Computer Research
Science, Technology, & Human Values, 1985The last 15 years have seen an explosive growth in university-based research activities in the fields of computer research and information theory. Technology has both driven and been driven by these activities. Development of the technology for very large-scale integration (VLSI), for example, has driven research on special purpose processors and ...
openaire +1 more source
On the Study of Secrecy Capacity with Outdated CSI
2016In this paper, we study the secrecy capacity of the proposed transmission scheme. It is provided that the SNR at the selected best relay, destination and eavesdropper are same due to the symmetrical setup. The outage probability is considered here to evaluate the performance of such a secrecy communication system.
Tong Chen +3 more
openaire +1 more source
2019
Secrecy and deception are under-explored in sociology. Secrecy may be considered negatively in contrast to the more positive status of privacy, yet boundaries between them can be blurred. These issues provide a backdrop for a discussion on problems in studying the state, with attention to Laura Nader’s call for ‘studying-up’ of powerful groups in ...
openaire +1 more source
Secrecy and deception are under-explored in sociology. Secrecy may be considered negatively in contrast to the more positive status of privacy, yet boundaries between them can be blurred. These issues provide a backdrop for a discussion on problems in studying the state, with attention to Laura Nader’s call for ‘studying-up’ of powerful groups in ...
openaire +1 more source

