Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Universal composability (UC) is a primary security flavor for designing oblivious transfer (OT) due to its advantage of arbitrary composition. However, the study of UC-secure OT over lattices is still far behind compared with constructions over ...
Momeng Liu +6 more
doaj +1 more source
The visit of Josip Broz Tito to Kosovo and Metohia (25-28 March 1967) in the highlights of post-Brioni happenings in the Province [PDF]
With the Fourth Plenum and suppression of centralistic current led by the chief of the State Security Service Aleksandar Ranković, the author stresses that a new period in the history of Kosovo and Metohia set in. By the loosening of political burdensome
Živković Milutin
doaj
Legal Aspects of Appointing the Commissioner of the Croatian Government in the Municipality of Podravska Slatina [PDF]
The Serbian Democratic Party (SDS) was a radical ethnic-nationalist Serbian party, founded on the platform in front of the railway station in Knin on February 17, 1990 and registered in the Register of Social Organizations of the Socialist Republic of ...
Miljenko Brekalo
doaj
Analisis Kepuasan Pelayanan Bagi Pelanggan Di Obyek Wisata Taman Marga Satwa Mangkang [PDF]
This research aims is to describe the level of service satisfaction forcustomers in the State Highways Animal Sights Mangkang. The study used adescriptive quantitative research or design that is mixed between qualitative withquantitative to measure ...
Lestari, H. (Hesti) +2 more
core
The article analyses the current legislation of Ukraine which provides for normative and legal regulation of public relations in the information sphere of activity of security and defence forces, in particular, the State Border Guard Service of Ukraine ...
V. V. Polovnikov
doaj +1 more source
Traffic Profiling for Mobile Video Streaming
This paper describes a novel system that provides key parameters of HTTP Adaptive Streaming (HAS) sessions to the lower layers of the protocol stack. A non-intrusive traffic profiling solution is proposed that observes packet flows at the transmit queue ...
Karagkioules, Theodoros +3 more
core +1 more source
Promoting the Readiness of Minors in Supplemental Security Income (PROMISE) [CFDA 84.418P] [PDF]
Over the past two decades, New York State (NYS) has been actively and collaboratively engaged in systems change across three primary domains: 1) to develop a comprehensive employment system to reduce barriers to work and improve employment outcomes of ...
Employment and Disability Institute +2 more
core +1 more source
Internet of Things: Current Challenges in the Quality Assurance and Testing Methods
Contemporary development of the Internet of Things (IoT) technology brings a number of challenges in the Quality Assurance area. Current issues related to security, user's privacy, the reliability of the service, interoperability, and integration are ...
A Al-Fuqaha +18 more
core +1 more source
A comparison between e-government practices in Taiwan and New Zealand. [PDF]
Few studies have focused on comparing the state of e-government in Western- and Non-Western settings, where the political, social, economic, and cultural environments can be markedly different.
Chen, Wan Jung +2 more
core +1 more source
Security in Cognitive Radio Networks
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs).
Akin, Sami
core +1 more source

