A Cloud-based RFID Authentication Protocol with Insecure Communication Channels [PDF]
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alshehri, Awatif +2 more
core +2 more sources
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino +2 more
wiley +1 more source
Considerații privind implicarea serviciilor secrete sovietice și a Cominternului în organizarea rebeliunii de la Tatar-Bunar [PDF]
This study deals with the involvement of the Soviet secret services and the Communist International in organizing the anti-Romanian rebellion in Southern Bessarabia in September 1924. The article contributes to a better understanding of the Soviet Union’
Ponomariov, Vitalie
doaj
Civilised men -- members of the craft : Freemasonry in Auckland to the formation of the Grand Lodge of New Zealandin 1890 : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in History at Massey University [PDF]
The public's fascination with freemasonry seems endless. Freemasons are variously believed to be members of a mysterious brotherhood of enormous influence, a secret society believed to have its roots in the order of the Knights Templar or the Egyptian ...
Gardiner, Carol Elizabeth
core
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
A Systemic Model for Understanding Business Interactions With Biodiversity and Ecosystems
ABSTRACT Biodiversity loss and ecosystem degradation represent critical threats to human well‐being and economic resilience, challenging businesses to understand and manage their interdependence with natural systems. This study develops a systemic framework—the BioModel—that elucidates the reciprocal relationship between businesses, biodiversity, and ...
Lino Cinquini +2 more
wiley +1 more source
Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia +2 more
wiley +1 more source
Taking a Page from Retail: Secret Shopping for Academic Libraries
Objective – The University Libraries at the University of North Carolina at Greensboro (UNCG) sought to gain feedback on the customer service experience beyond satisfaction surveys.
Kathryn Crowe, Agnes Kathy Bradshaw
doaj +3 more sources
Життя та смерть Миколи Хвильового у світлі розсекречених документів ГПУ [PDF]
Based on the declassified documents of former Soviet secret services, the political and artistic activity of, a Soviet Ukrainian writer, Mykola Khvylovyi was ...
Kaufmann, W. +2 more
core
Anonymous Single-Sign-On for n designated services with traceability [PDF]
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations.
CI Fan +26 more
core +2 more sources

