325 results found (page 2 of 22)
https://www.academia.edu/31433030/Audited_credential_delegation_A_usable_security_solution…

…010.0026 Published online 30 March 2011 Audited credential delegation: a usable security solution for the virtual physiological human toolkit Ali N. Haidar1, Stefan J. Zasada1, Peter V. Coveney1,*, Ali E. Abdallah2, Bruce Beckles3 and Mike A. S. Jones4 1 Centre for Computational …

https://www.academia.edu/45650165/Authoritarian_resilience_through_securitization_an_Islam…

…rgeted by the MHP. That is, the AKP constructed these minorities as existential security threats to the nation, country and the state, in a remarkable U-turn. This article particularly investigates the securitization case of a political party, the pro-Kurdish HDP (Peoples’ Democr…

https://www.academia.edu/114613570/Canada_and_the_Camp_David_Principles_Assessing_Bilatera…

…e, Fellow the Canadian Global Affairs Institute, Senior Fellow at the East Asia Security Centre, and a Visiting Fellow with the Japan In- stitute for International Affairs. Dr. Karthik Nachiappan is a Research Fellow at the Institute of South Asian Stud- ies, National University …

https://www.academia.edu/126727616/Climate_change_and_marketing_a_bibliometric_analysis_of…

… have been identified that are Grote (2014) important for ensuring future food security: (i) sustainable intenCan we improve global food security? A socio-economic and politisification, (ii) food system changes, and (iii) policy reforms with cal perspective increased consumer awa…

https://www.academia.edu/45303814/Authoritarian_resilience_through_securitization_an_Islam…

…rgeted by the MHP. That is, the AKP constructed these minorities as existential security threats to the nation, country and the state, in a remarkable U-turn. This article particularly investigates the securitization case of a political party, the pro-Kurdish HDP (Peoples’ Democr…

https://www.academia.edu/89690141/Multi_platform_Process_Flow_Models_and_Algorithms_for_Ex…

…, the literature criminals bring to the use of these devices. on specific email security techniques was reviewed, Therefore, some of these models focus on a specific in phase two, the algorithm was developed and in step of the mining process or depend on the phase three, the algo…

https://www.academia.edu/610550/Audited_credential_delegation_a_usable_security_solution_f…

….researchgate.net/publication/225273611 Audited credential delegation: A usable security solution for the virtual physiological human toolkit Article in Interface focus: a theme supplement of Journal of the Royal Society interface · June 2011 DOI: 10.1098/rsfs.2010.0026 · Source:…