نتایج جستجو برای: public
تعداد نتایج: 381305 فیلتر نتایج به سال:
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership of the element. Typically, the membership witness has to be synchronized with the accumulator value: it has to be updated every time another e...
Genomics and Public Health: Development of Web-based Training Tools for Increasing Genomic Awareness
In 2001, the Centers for Disease Control and Prevention funded three Centers for Genomics and Public Health to develop training tools for increasing genomic awareness. Over the past three years, the centers, working together with the Centers for Disease Control and Prevention's Office of Genomics and Disease Prevention, have developed tools to increase awareness of the impact genomics will have...
This paper examines the relationship between public policies and professional practices with respect to healthcare needs. Taking a theoretical-conceptual approach, practices are defined as acts that are permeated by technical-scientific and socio-historical determinants for the social production of work, and the possibilities for cultural, ethical and political changes were analyzed in order to...
Wireless Sensor Networks (WSN) have played a crucial role in many military and civilian applications. However, with the increase in popularity of such networks, the demand for security is also increasing proportionally. The new sophisticated attacks can easily compromise these resource constraint networks such as WSN. In this paper, we propose a location and energy efficient routing scheme usin...
Childhood violence is a major public health and social policy concern in the United States. Scientists and policymakers alike have increasingly turned their attention to the causes of childhood violence and the extent to which its course can be modified through well-planned preventive interventions. However, it is not apparent that policymakers draw upon basic research findings in formulating t...
To summarize the historical events and drivers underlying public policy for the prevention and control of healthcare-associated infections in Brazil and in the United Kingdom. In doing so, the article aims to identify lessons and recommendations for future development of public policy. The analysis is based on a historical overview of national healthcare-associated infections programs taken fro...
MALCOLM X, the Kerner Commission Report, and a variety of other persons, events, and materials have made the concept of racism familiar. Social class discrimination also needs no introduction. However, we may soon have to consider very seriously a form of bigotry we now tend to overlook: age discrimination or age-ism, prejudice by one age group toward other age groups. If such bias exists, migh...
Many researchers have explored how neoliberal restructuring of the workplace has reduced the standard of living and increased workplace stress among private sector employees. However, few have focused on how neoliberal restructuring of public policy has had similar effects on the public sector workforce. Using original case study research, the authors examine how two iconic pieces of neoliberal...
Marketing practices that promote calorie-dense, nutrient-poor foods directly to children and adolescents present significant public health risk. Worldwide, calls for government action and industry change to protect young people from the negative effects of food marketing have increased. Current proposals focus on restricting television advertising to children under 12 years old, but current psy...
This paper analyzes security of Korean USIM-based PKI certificate service. Korean PKI certificate consists of public key and password encrypted private key on disk. Due to insufficient security provided by single password, Korean mobile operators introduced USIM-based PKI system. We found several vulnerabilities inside the system, including private key’s RSA prime number leakage during certific...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید