Results 61 to 70 of about 617,080 (246)

A Cloud-based RFID Authentication Protocol with Insecure Communication Channels [PDF]

open access: yes, 2016
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alshehri, Awatif   +2 more
core   +2 more sources

Green Innovation and Firm Efficiency: The Role of Institutional Quality in Italian High‐Tech Manufacturing Sectors

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this research is to verify whether institutional quality affects the relationship between green innovation and firm efficiency within the high‐tech manufacturing sectors. To estimate jointly the parameters of a stochastic frontier and the coefficients of a model explaining technical inefficiency, we employed the one‐step estimation ...
Mariarosaria Agostino   +2 more
wiley   +1 more source

Considerații privind implicarea serviciilor secrete sovietice și a Cominternului în organizarea rebeliunii de la Tatar-Bunar [PDF]

open access: yesPlural: History, Culture, Society, 2019
This study deals with the involvement of the Soviet secret services and the Communist International in organizing the anti-Romanian rebellion in Southern Bessarabia in September 1924. The article contributes to a better understanding of the Soviet Union’
Ponomariov, Vitalie
doaj  

Civilised men -- members of the craft : Freemasonry in Auckland to the formation of the Grand Lodge of New Zealandin 1890 : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in History at Massey University [PDF]

open access: yes, 2005
The public's fascination with freemasonry seems endless. Freemasons are variously believed to be members of a mysterious brotherhood of enormous influence, a secret society believed to have its roots in the order of the Knights Templar or the Egyptian ...
Gardiner, Carol Elizabeth
core  

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

A Systemic Model for Understanding Business Interactions With Biodiversity and Ecosystems

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Biodiversity loss and ecosystem degradation represent critical threats to human well‐being and economic resilience, challenging businesses to understand and manage their interdependence with natural systems. This study develops a systemic framework—the BioModel—that elucidates the reciprocal relationship between businesses, biodiversity, and ...
Lino Cinquini   +2 more
wiley   +1 more source

Transformation Teams Leading the Hispanic‐Serving Institutions Movement at HSI Community Colleges

open access: yesNew Directions for Community Colleges, EarlyView.
ABSTRACT The Department of Education defunded discretionary grant programs for enrollment‐based minority‐serving institutions (MSIs) on September 10, 2025, yet Hispanic‐serving institutions (HSIs) still exist and must continue to adapt to their growing population of Latine/x students.
Gina Ann Garcia   +2 more
wiley   +1 more source

Taking a Page from Retail: Secret Shopping for Academic Libraries

open access: yesEvidence Based Library and Information Practice, 2016
Objective – The University Libraries at the University of North Carolina at Greensboro (UNCG) sought to gain feedback on the customer service experience beyond satisfaction surveys.
Kathryn Crowe, Agnes Kathy Bradshaw
doaj   +3 more sources

Життя та смерть Миколи Хвильового у світлі розсекречених документів ГПУ [PDF]

open access: yes, 2008
Based on the declassified documents of former Soviet secret services, the political and artistic activity of, a Soviet Ukrainian writer, Mykola Khvylovyi was ...
Kaufmann, W.   +2 more
core  

Anonymous Single-Sign-On for n designated services with traceability [PDF]

open access: yes, 2018
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations.
CI Fan   +26 more
core   +2 more sources

Home - About - Disclaimer - Privacy