Results 41 to 50 of about 927,073 (74)

Safe Deals Between Strangers [PDF]

open access: yesarXiv, 1999
E-business, information serving, and ubiquitous computing will create heavy request traffic from strangers or even incognitos. Such requests must be managed automatically. Two ways of doing this are well known: giving every incognito consumer the same treatment, and rendering service in return for money. However, different behavior will be often wanted,
arxiv  

Families’ experiences of housing and housing supports within the context of parental incarceration

open access: yesAnalyses of Social Issues and Public Policy, Volume 25, Issue 1, April 2025.
Abstract Rates of parental incarceration and family homelessness continue to rise in the United States, and many families experience both of these risks concurrently. Both parental incarceration and homelessness independently relate to negative outcomes for children and families, with numerous studies documenting families’ experiences of each risk ...
Kerrie Fanning   +3 more
wiley   +1 more source

Navigating scale and interdisciplinary dynamics in conservation social science

open access: yesConservation Biology, Volume 39, Issue 2, April 2025.
Abstract To better understand and address global human–environment crises, interdisciplinary collaborations across the natural and social sciences have become increasingly common in conservation. Within such collaborations, the question of scale can cause tensions: how to agree on the unit of measurement and analysis?
Walker DePuy   +3 more
wiley   +1 more source

A New Remote User Authentication Scheme Using Smart Cards with Check Digits [PDF]

open access: yesarXiv, 2005
Since 1981, when Lamport introduced the remote user authentication scheme using table, a plenty of schemes had been proposed with table and without table using. In 1993, Chang and Wu [5] introduced Remote password authentication scheme with smart cards. A number of remote authentication schemes with smart cards have been proposed since then.
arxiv  

Complex family negotiations among queer and trans college students of color: A narrative inquiry

open access: yesFamily Relations, Volume 74, Issue 2, Page 808-829, April 2025.
Abstract Objective This study explored how queer and trans people of color (QTPOC) college students navigate complex family relationships and understand the contexts that shape their family bonds. Background QTPOC face myriad forces of oppression that complicate their notion of family.
Christian D. Chan   +2 more
wiley   +1 more source

Effectiveness of a Rotating‐Leg Prepper for Reducing Pressure Injury and Preventing Surgical Site Infection in Patients Undergoing Heart Surgery: Paired Matching Randomised Controlled Trial

open access: yesInternational Wound Journal, Volume 22, Issue 4, April 2025.
ABSTRACT This study aims to evaluate the effectiveness of a rotating‐leg prepper (intervention) compared with a rolled gauze bandage (control) in reducing pressure injury and preventing surgical site infection in the legs of patients undergoing heart surgery.
Natthacha Chiannilkulchai   +1 more
wiley   +1 more source

Advanced Frequency Identification Power Metering System for Energy Usage [PDF]

open access: yesarXiv, 2018
Energy meter measures the amount of power consumed by electrical loads in residential, industrial and commercial applications. In this project, the focus goes to the implementation of a smart power measurement system to allocate identification for individuals and determine the clients energy usage.
arxiv  

Cryptanalysis on Four Two-Party Authentication Protocols [PDF]

open access: yes(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, 2010, 2010
In this paper, we analyze four authentication protocols of Bindu et al., Goriparthi et al., Wang et al. and H\"olbl et al.. After investigation, we reveal several weaknesses of these schemes. First, Bindu et al.'s protocol suffers from an insider impersonation attack if a malicious user obtains a lost smart card.
arxiv  

Secure Debit Card Device Model [PDF]

open access: yesarXiv, 2014
The project envisages the implementation of an e-payment system utilizing FIPS-201 Smart Card. The system combines hardware and software modules. The hardware module takes data insertions (e.g. currency notes), processes the data and then creates connection with the smart card using serial/USB ports to perform further mathematical manipulations.
arxiv  

Secure Communication Protocol for Smart Transportation Based on Vehicular Cloud [PDF]

open access: yesACM Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, pp. 372-376, 2019
The pioneering concept of connected vehicles has transformed the way of thinking for researchers and entrepreneurs by collecting relevant data from nearby objects. However, this data is useful for a specific vehicle only. Moreover, vehicles get a high amount of data (e.g., traffic, safety, and multimedia infotainment) on the road. Thus, vehicles expect
arxiv  

Home - About - Disclaimer - Privacy