Results 261 to 270 of about 48,405 (313)
A lightweight certificateless aggregate signature scheme without pairing for VANETs. [PDF]
Yue Q, Jiang W, Lei H.
europepmc +1 more source
SURFACE TENSIONS: Roads, Potholes and the Embodied Politics of Driving in Urban India
Abstract In this article I draw on the embodied experience of driving into potholes and on bumpy roads in Hyderabad to show how pockmarked roads become a terrain on which political sensibilities are shaped. Drawing on ethnographic material collected over six years, I analyze how potholes shape driving dispositions in a city that is attempting to brand ...
Sneha Annavarapu
wiley +1 more source
Secure IoV communications for smart fleet systems empowered with ASCON. [PDF]
A J B, Kaythry P.
europepmc +1 more source
Abstract The Beqaa Valley in Lebanon has become increasingly polluted, and residents are attributing illness to improper waste disposal and dumping. This article explores local epistemologies of pollution’s causes and effects in three films, which were researched and produced by local residents of Bar Elias, a small town in the Beqaa, which has rapidly
Hannah Sender +2 more
wiley +1 more source
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley +1 more source
Rebuilding the Ladder? Contemporary Contests Over Industrial Policy
ABSTRACT Does the greater embrace of industrial policy globally signal the emergence of a New Washington Consensus? We show that the multiplication of industrial policies, while consequential, signals neither normalisation nor consensus. Rather, industrial policy is increasingly the object of contestation over norms and practices of state ...
Ilias Alami, Jack Taggart, Tom Chodor
wiley +1 more source
The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios. [PDF]
Rahayu M +5 more
europepmc +1 more source
Clustering and OFDMA-based MAC protocol (COMAC) for vehicular ad hoc networks
Khalid Abdel Hafeez +3 more
openalex +1 more source
Layered Incoherence in Middle Power Foreign Policy: Indonesia and the U.S.‐China Rivalry
ABSTRACT Amid the intensifying U.S.‐China rivalry, middle powers, especially those from the global south, are often portrayed in IR literature as strategic hedgers, expected to balance between major powers to preserve regional autonomy and stability. Yet many, like Indonesia, display contradictory foreign policy behaviour by rhetorically championing ...
Moch Faisal Karim
wiley +1 more source

