Results 71 to 80 of about 13,481,561 (335)
This paper explores the securitisation of British Muslims within a global context in which tensions are reignited by the threat that Islamist terrorism, and Islam more generally, are considered to pose to the West.
Stefano Bonino
semanticscholar +1 more source
Urinary LGALS3BP is elevated in bladder cancer patients compared to healthy controls as detected by the 1959 antibody–based ELISA. The antibody shows enhanced reactivity to the high‐mannose glycosylated variant secreted by cancer cells treated with kifunensine (KIF).
Asia Pece +18 more
wiley +1 more source
Complexity and Unwinding for Intransitive Noninterference [PDF]
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian +3 more
core
Discrete-phase-randomized coherent state source and its application in quantum key distribution [PDF]
Coherent state photon sources are widely used in quantum information processing. In many applications, such as quantum key distribution (QKD), a coherent state is functioned as a mixture of Fock states by assuming its phase is continuously randomized. In
Cao, Zhu +3 more
core +2 more sources
Generation of two normal and tumour (cancerous) paired human cell lines using an established tissue culture technique and their characterisation is described. Cell lines were characterised at cellular, protein, chromosome and gene expression levels and for HPV status.
Simon Broad +12 more
wiley +1 more source
Jhe article examines some features of the revitalization of the terrorist organization ISIS, its cooperative ties with other extremist groups. Analyzed the approaches of Russia and the USA in the measurement ofthe activities of ISIL and its supporters ...
Stanislav Igorevich Sergeev
doaj
Fragile States: Securing Development
Fragile states are the toughest development challenge of our era. But we ignore them at our peril: about one billion people live in fragile states, including a disproportionate number of the world's extreme poor, and they account for most of today's wars.
openaire +2 more sources
Secure & Prepared, January 10, 2007, Vol.3, no.1 [PDF]
Secure & Prepared is a bi-weekly publication of the Iowa Homeland Security & Emergency Management Division for those involved in the homeland security system in the state of ...
core
Orthogonal-state-based protocols of quantum key agreement [PDF]
Two orthogonal-state-based protocols of quantum key agreement (QKA) are proposed. The first protocol of QKA proposed here is designed for two-party QKA, whereas the second protocol is designed for multi-party QKA. Security of these orthogonal-state-based
Alam, Nasir +2 more
core +1 more source
Security Services Using Blockchains: A State of the Art Survey [PDF]
This paper surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list, data and resource provenance, and integrity assurance.
Tara Salman +4 more
semanticscholar +1 more source

