Showing 121 - 140 results of 179 for search '(((elsa OR els) OR esa) OR ((mdella OR mbplla) OR ella))', query time: 0.17s Refine Results
  1. 121
  2. 122

    Gaps In Primary Care And Health System Performance In Six Latin American And Caribbean Countries by Macinko, James, Guanais, Frederico C., Mullachery, Pricila, Jimenez, Geronimo

    Published 2016
    “…We applied a validated survey on access, use, and satisfaction with health care services to nationally representative samples of the populations of Brazil, Colombia, El Salvador, Jamaica, Mexico, and Panama. Respondents reported considerable gaps in the ways in which primary care is organized, financed, and delivered. …”
    Get full text
    Get full text
    Journal Article
  3. 123
  4. 124
  5. 125
  6. 126

    Bella's empowerment - why the twilight saga is not anti-feminist. by See, Shawn Kai Sheng.

    Published 2013
    “…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
    Get full text
    Final Year Project (FYP)
  7. 127
  8. 128

    Information encryption processing over wireless LAN by Nguyen, Daniel Vinh Quang.

    Published 2013
    “…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
    Get full text
    Final Year Project (FYP)
  9. 129
  10. 130
  11. 131
  12. 132
  13. 133
  14. 134

    Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming by Singh, Sushil Kumar, Kumar, Manish, Khanna, Ashish, Virdee, Bal Singh

    Published 2025
    “…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
    Get full text
    Article
  15. 135
  16. 136

    Cache refinement type for side-channel detection of cryptographic software by Jiang, Ke, Bao, Yuyan, Wang, Shuai, Liu, Zhibo, Zhang, Tianwei

    Published 2023
    “…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
    Get full text
    Conference Paper
  17. 137

    Rethinking small-footprint counter-terrorism: moving from kinetic operations to security force assistance by Bell, Louis

    Published 2015
    “…Drawing on the experiences of U.S. advisory efforts in El Salvador and the Philippines, this paper demonstrates that a counter-terrorism strategy centred on Security Force Assistance holds far more potential than the current enemy-centric policy. …”
    Get full text
    Thesis
  18. 138
  19. 139
  20. 140