Results 11 to 20 of about 6,929,434 (416)
Is Social Security Secure with NDC? [PDF]
The introduction of NDC public pension scheme in few European countries, such as Latvia, Sweden, Italy, and Poland, in the nineties was motivated, among other things, by the need (i) to ensure the long term financial sustainability of the public pension system by linking pension returns to economic growth; (ii) to reduce the existing distortions in the
BOERI, TITO MICHELE, GALASSO, VINCENZO
openaire +4 more sources
On the Secure Implementation of Security Protocols [PDF]
AbstractWe consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services.
Mads Dam, Pablo Giambiagi
openaire +2 more sources
Deep learning-based solution for smart contract vulnerabilities detection
This paper aims to explore the application of deep learning in smart contract vulnerabilities detection. Smart contracts are an essential part of blockchain technology and are crucial for developing decentralized applications.
Xueyan Tang+4 more
doaj +1 more source
The development of new therapies against SARS-CoV-2 is required to extend the toolkit of intervention strategies to combat the global pandemic. In this study, hyperimmune plasma from sheep immunised with whole spike SARS-CoV-2 recombinant protein has ...
Stephen Findlay-Wilson+23 more
doaj +1 more source
The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj +1 more source
Vaccine effectiveness of a ChAdOx1-S booster was estimated in a test-negative case-control study in England. Protection was found to be moderate against mild disease but remained high and comparable to that of an mRNA booster against hospitalisation with
Freja Cordelia Møller Kirsebom+5 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou+6 more
doaj +2 more sources
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou+3 more
doaj +1 more source
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object.
Jensen, Thomas+2 more
openaire +7 more sources
How do foreign powers disengage from a conflict? We study this issue by examining the recent, large-scale security transition from international troops to local forces in the ongoing civil conflict in Afghanistan. We construct a new dataset that combines information on this transition process with declassified conflict outcomes and previously ...
Fetzer, Thiemo+3 more
openaire +7 more sources