Results 71 to 80 of about 13,481,561 (335)

The British state ‘security syndrome’ and Muslim diversity: challenges for liberal democracy in the age of terror

open access: yesContemporary Islam, 2016
This paper explores the securitisation of British Muslims within a global context in which tensions are reignited by the threat that Islamist terrorism, and Islam more generally, are considered to pose to the West.
Stefano Bonino
semanticscholar   +1 more source

Glycosylated LGALS3BP is highly secreted by bladder cancer cells and represents a novel urinary disease biomarker

open access: yesMolecular Oncology, EarlyView.
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece   +18 more
wiley   +1 more source

Complexity and Unwinding for Intransitive Noninterference [PDF]

open access: yes, 2013
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian   +3 more
core  

Discrete-phase-randomized coherent state source and its application in quantum key distribution [PDF]

open access: yes, 2015
Coherent state photon sources are widely used in quantum information processing. In many applications, such as quantum key distribution (QKD), a coherent state is functioned as a mixture of Fock states by assuming its phase is continuously randomized. In
Cao, Zhu   +3 more
core   +2 more sources

Molecular characterisation of human penile carcinoma and generation of paired epithelial primary cell lines

open access: yesMolecular Oncology, EarlyView.
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad   +12 more
wiley   +1 more source

ABOUT SOME FEATURES OF THE APPROACHES OF THE USA AND RUSSIA IN THE MEASUREMENT OF THE ACTIVITIES OF TERRORIST ORGANIZATION ISIL

open access: yesСовременная наука и инновации, 2022
Jhe article examines some features of the revitalization of the terrorist organization ISIS, its cooperative ties with other extremist groups. Analyzed the approaches of Russia and the USA in the measurement ofthe activities of ISIL and its supporters ...
Stanislav Igorevich Sergeev
doaj  

Fragile States: Securing Development

open access: yesSurvival, 2008
Fragile states are the toughest development challenge of our era. But we ignore them at our peril: about one billion people live in fragile states, including a disproportionate number of the world's extreme poor, and they account for most of today's wars.
openaire   +2 more sources

Secure & Prepared, January 10, 2007, Vol.3, no.1 [PDF]

open access: yes, 2007
Secure & Prepared is a bi-weekly publication of the Iowa Homeland Security & Emergency Management Division for those involved in the homeland security system in the state of ...

core  

Orthogonal-state-based protocols of quantum key agreement [PDF]

open access: yes, 2013
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based
Alam, Nasir   +2 more
core   +1 more source

Security Services Using Blockchains: A State of the Art Survey [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2018
This paper surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list, data and resource provenance, and integrity assurance.
Tara Salman   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy