Showing 161 - 180 results of 221 for search '((els OR esa) OR ((della OR (mbell OR mcell)) OR (plla OR bell)))', query time: 0.16s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164

    Gaps In Primary Care And Health System Performance In Six Latin American And Caribbean Countries by Macinko, James, Guanais, Frederico C., Mullachery, Pricila, Jimenez, Geronimo

    Published 2016
    “…We applied a validated survey on access, use, and satisfaction with health care services to nationally representative samples of the populations of Brazil, Colombia, El Salvador, Jamaica, Mexico, and Panama. Respondents reported considerable gaps in the ways in which primary care is organized, financed, and delivered. …”
    Get full text
    Get full text
    Journal Article
  5. 165
  6. 166
  7. 167
  8. 168

    Bella's empowerment - why the twilight saga is not anti-feminist. by See, Shawn Kai Sheng.

    Published 2013
    “…Rowling and the Fifty Shades of Grey trilogy by E.L. James that have taken the contemporary literary scene by storm, no other novels can arguably match up to the success of Stephenie Meyer’s Twilight series. …”
    Get full text
    Final Year Project (FYP)
  9. 169
  10. 170

    Information encryption processing over wireless LAN by Nguyen, Daniel Vinh Quang.

    Published 2013
    “…The SecureCommunication2.0 and Mobile-Robot Tracking System include different types of encryption technologies such as Digital Encryption Standard (DES), Diffie-Hellman Public Key Algorithm, ElGamal algorithms, Message Digests and Digital Signatures. …”
    Get full text
    Final Year Project (FYP)
  11. 171
  12. 172
  13. 173
  14. 174
  15. 175
  16. 176

    Blockchain and FL-based secure architecture for enhanced external Intrusion detection in smart farming by Singh, Sushil Kumar, Kumar, Manish, Khanna, Ashish, Virdee, Bal Singh

    Published 2025
    “…Our architecture employs Ensemble Learning (EL) for the Local Model at the Ensemble Layer to train each Smart Land's data and offers privacy-prevented security. …”
    Get full text
    Article
  17. 177
  18. 178

    Cache refinement type for side-channel detection of cryptographic software by Jiang, Ke, Bao, Yuyan, Wang, Shuai, Liu, Zhibo, Zhang, Tianwei

    Published 2023
    “…We evaluate CaType in identifying side channel vulnerabilities in real-world crypto software, including RSA, ElGamal, and (EC)DSA from OpenSSL and Libgcrypt. …”
    Get full text
    Conference Paper
  19. 179
  20. 180