Results 51 to 60 of about 1,971,716 (147)

Dual-Mode Encryption for UC-Secure String OT from Learning with Errors

open access: yesIET Information Security
Universal composability (UC) is a primary security flavor for designing oblivious transfer (OT) due to its advantage of arbitrary composition. However, the study of UC-secure OT over lattices is still far behind compared with constructions over ...
Momeng Liu   +6 more
doaj   +1 more source

The visit of Josip Broz Tito to Kosovo and Metohia (25-28 March 1967) in the highlights of post-Brioni happenings in the Province [PDF]

open access: yesBaština, 2011
With the Fourth Plenum and suppression of centralistic current led by the chief of the State Security Service Aleksandar Ranković, the author stresses that a new period in the history of Kosovo and Metohia set in. By the loosening of political burdensome
Živković Milutin
doaj  

Legal Aspects of Appointing the Commissioner of the Croatian Government in the Municipality of Podravska Slatina [PDF]

open access: yesHum, 2019
The Serbian Democratic Party (SDS) was a radical ethnic-nationalist Serbian party, founded on the platform in front of the railway station in Knin on February 17, 1990 and registered in the Register of Social Organizations of the Socialist Republic of ...
Miljenko Brekalo
doaj  

Analisis Kepuasan Pelayanan Bagi Pelanggan Di Obyek Wisata Taman Marga Satwa Mangkang [PDF]

open access: yes, 2013
This research aims is to describe the level of service satisfaction forcustomers in the State Highways Animal Sights Mangkang. The study used adescriptive quantitative research or design that is mixed between qualitative withquantitative to measure ...
Lestari, H. (Hesti)   +2 more
core  

Information security of the personnel of the State Border Guard Service of Ukraine: problematic issues of normative and legal regulation

open access: yesLaw and Safety
The article analyses the current legislation of Ukraine which provides for normative and legal regulation of public relations in the information sphere of activity of security and defence forces, in particular, the State Border Guard Service of Ukraine ...
V. V. Polovnikov
doaj   +1 more source

Traffic Profiling for Mobile Video Streaming

open access: yes, 2017
This paper describes a novel system that provides key parameters of HTTP Adaptive Streaming (HAS) sessions to the lower layers of the protocol stack. A non-intrusive traffic profiling solution is proposed that observes packet flows at the transmit queue ...
Karagkioules, Theodoros   +3 more
core   +1 more source

Promoting the Readiness of Minors in Supplemental Security Income (PROMISE) [CFDA 84.418P] [PDF]

open access: yes, 2013
Over the past two decades, New York State (NYS) has been actively and collaboratively engaged in systems change across three primary domains: 1) to develop a comprehensive employment system to reduce barriers to work and improve employment outcomes of ...
Employment and Disability Institute   +2 more
core   +1 more source

Internet of Things: Current Challenges in the Quality Assurance and Testing Methods

open access: yes, 2018
Contemporary development of the Internet of Things (IoT) technology brings a number of challenges in the Quality Assurance area. Current issues related to security, user's privacy, the reliability of the service, interoperability, and integration are ...
A Al-Fuqaha   +18 more
core   +1 more source

A comparison between e-government practices in Taiwan and New Zealand. [PDF]

open access: yes, 2007
Few studies have focused on comparing the state of e-government in Western- and Non-Western settings, where the political, social, economic, and cultural environments can be markedly different.
Chen, Wan Jung   +2 more
core   +1 more source

Security in Cognitive Radio Networks

open access: yes, 2014
In this paper, we investigate the information-theoretic security by modeling a cognitive radio wiretap channel under quality-of-service (QoS) constraints and interference power limitations inflicted on primary users (PUs).
Akin, Sami
core   +1 more source

Home - About - Disclaimer - Privacy