Showing 201 - 220 results of 259 for search '(((elisa OR (els OR else)) OR esa) OR ((idella OR mbplla) OR ella))', query time: 0.15s Refine Results
  1. 201
  2. 202

    Gaps In Primary Care And Health System Performance In Six Latin American And Caribbean Countries by Macinko, James, Guanais, Frederico C., Mullachery, Pricila, Jimenez, Geronimo

    Published 2016
    “…We applied a validated survey on access, use, and satisfaction with health care services to nationally representative samples of the populations of Brazil, Colombia, El Salvador, Jamaica, Mexico, and Panama. Respondents reported considerable gaps in the ways in which primary care is organized, financed, and delivered. …”
    Get full text
    Get full text
    Journal Article
  3. 203
  4. 204
  5. 205
  6. 206

    Bella's empowerment - why the twilight saga is not anti-feminist. by See, Shawn Kai Sheng.

    Published 2013
    “…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
    Get full text
    Final Year Project (FYP)
  7. 207
  8. 208

    Information encryption processing over wireless LAN by Nguyen, Daniel Vinh Quang.

    Published 2013
    “…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
    Get full text
    Final Year Project (FYP)
  9. 209
  10. 210
  11. 211
  12. 212
  13. 213
  14. 214

    Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming by Singh, Sushil Kumar, Kumar, Manish, Khanna, Ashish, Virdee, Bal Singh

    Published 2025
    “…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
    Get full text
    Article
  15. 215
  16. 216

    Cache refinement type for side-channel detection of cryptographic software by Jiang, Ke, Bao, Yuyan, Wang, Shuai, Liu, Zhibo, Zhang, Tianwei

    Published 2023
    “…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
    Get full text
    Conference Paper
  17. 217

    Rethinking small-footprint counter-terrorism: moving from kinetic operations to security force assistance by Bell, Louis

    Published 2015
    “…Drawing on the experiences of U.S. advisory efforts in El Salvador and the Philippines, this paper demonstrates that a counter-terrorism strategy centred on Security Force Assistance holds far more potential than the current enemy-centric policy. …”
    Get full text
    Thesis
  18. 218
  19. 219
  20. 220