Results 11 to 20 of about 6,929,434 (416)

Is Social Security Secure with NDC? [PDF]

open access: yesSSRN Electronic Journal, 2010
The introduction of NDC public pension scheme in few European countries, such as Latvia, Sweden, Italy, and Poland, in the nineties was motivated, among other things, by the need (i) to ensure the long term financial sustainability of the public pension system by linking pension returns to economic growth; (ii) to reduce the existing distortions in the
BOERI, TITO MICHELE, GALASSO, VINCENZO
openaire   +4 more sources

On the Secure Implementation of Security Protocols [PDF]

open access: yesScience of Computer Programming, 2003
AbstractWe consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services.
Mads Dam, Pablo Giambiagi
openaire   +2 more sources

Deep learning-based solution for smart contract vulnerabilities detection

open access: yesScientific Reports, 2023
This paper aims to explore the application of deep learning in smart contract vulnerabilities detection. Smart contracts are an essential part of blockchain technology and are crucial for developing decentralized applications.
Xueyan Tang   +4 more
doaj   +1 more source

Refinement of an ovine-based immunoglobulin therapy against SARS-CoV-2, with comparison of whole IgG versus F(ab′)2 fragments

open access: yesScientific Reports, 2023
The development of new therapies against SARS-CoV-2 is required to extend the toolkit of intervention strategies to combat the global pandemic. In this study, hyperimmune plasma from sheep immunised with whole spike SARS-CoV-2 recombinant protein has ...
Stephen Findlay-Wilson   +23 more
doaj   +1 more source

The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]

open access: yesSHS Web of Conferences, 2021
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj   +1 more source

Effectiveness of ChAdOx1-S COVID-19 booster vaccination against the Omicron and Delta variants in England

open access: yesNature Communications, 2022
Vaccine effectiveness of a ChAdOx1-S booster was estimated in a test-negative case-control study in England. Protection was found to be moderate against mild disease but remained high and comparable to that of an mRNA booster against hospitalisation with
Freja Cordelia Møller Kirsebom   +5 more
doaj   +1 more source

A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]

open access: yesPeerJ Computer Science, 2023
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou   +6 more
doaj   +2 more sources

Attention-based spatial–temporal multi-graph convolutional networks for casualty prediction of terrorist attacks

open access: yesComplex & Intelligent Systems, 2023
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou   +3 more
doaj   +1 more source

Secure the Clones [PDF]

open access: yesLogical Methods in Computer Science, 2012
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object.
Jensen, Thomas   +2 more
openaire   +7 more sources

Security Transitions [PDF]

open access: yesSSRN Electronic Journal, 2020
How do foreign powers disengage from a conflict? We study this issue by examining the recent, large-scale security transition from international troops to local forces in the ongoing civil conflict in Afghanistan. We construct a new dataset that combines information on this transition process with declassified conflict outcomes and previously ...
Fetzer, Thiemo   +3 more
openaire   +7 more sources

Home - About - Disclaimer - Privacy