-
1
Introduction: Not Enough Judges
Published 2017-12-01“… This is an Introduction, and Comment on the series presented here as "Not Enough Judges", arising out of a workshop in Oñati in 2016. …”
Get full text
Article -
2
Is Homomorphic Encryption-Based Deep Learning Secure Enough?
Published 2021-11-01Get full text
Article -
3
Why Did I Lose My Seat in the United States Congressional Elections? You Didn‘t Advertise Online Enough!
Published 2024-04-01Get full text
Article -
4
Can Thailand Protect 30% of Its Land Area for Biodiversity, and Will This Be Enough?
Published 2022-04-01Get full text
Article -
5
A systematic review of road traffic suicides: do we know enough to propose effective preventive measures?
Published 2024Journal article -
6
-
7
The SPD, the Labour Party and the Foreign Office
Published 1980“…<p>After Hitler invaded France in 1940, the leadership of the German Social Democratic party, the SPD, decided to accept an official invitation from the British Labour party and come to England. …”
Thesis -
8
Reconciliation of parties in a private prosecution case
Published 2021-12-01“…In order to terminate such criminal cases in connection with the reconciliation of the victim with the accused, it is not enough just to express the will of the parties, as well as to compensate the guilty person for the damage caused to the victim. …”
Get full text
Article -
9
The British Conservative Party and the state, 1929-1940
Published 2020“…Chapter two explores the development of Conservative policy in opposition up until the party’s unexpected return to government via the multi-party National Government 1931. …”
Thesis -
10
Technologies for the Formation of the Political Image of the Ruling Parliamentary Party in Social Networks and Blogs: on the Example of the All-Russian Political Party “United Russ...
Published 2024-08-01“…In particular, Russian political parties have been actively using these technologies for 14 years, but the specifics of the content of information and methods of forming parliamentary political party image, including the ruling one, have not been studied enough on the Russian Federation materials.The purpose of the study is to establish technologies for the political image of the ruling parliamentary party formation in social networks using the example of All-Russian political party “United Russia”. …”
Get full text
Article -
11
The Pandemic Strategies of the Far-Right Parties in Western Europe
Published 2020-11-01“…The author explores the behavior of the West-European far-right parties under the coronavirus crisis circumstances. …”
Get full text
Article -
12
Examining The Possibility of Transplanting Political Party Financial Assistances Variation to Indonesian Political Parties (Comparative Studies in Colombia, Brazil, South Korea, an...
Published 2023-12-01“…Besides, there are problems with political parties in Indonesia which in literatures are suspected to be related to the regulation of political party Financial Assistances. …”
Get full text
Article -
13
Farming The Nation: Agrarian Parties and the National Question in Interwar Europe
Published 2022-08-01“…Agrarian parties played a key role in many European countries during the interwar period, particularly in Scandinavia, Central and Eastern Europe. …”
Get full text
Article -
14
The dynamics of the party system in Spain in the light of the general elections in 2023
Published 2023-12-01“…The July 2023 general elections showed that the party system has partially stabilized, with the mainstream parties (PP and PSOE) recovering, but not enough to form a single-party government. …”
Get full text
Article -
15
Multi-party co-signature scheme based on SM2.
Published 2023-01-01“…However, the two-party collaboration scheme has the following shortcomings: firstly, it is not flexible enough, and it requires the collaborating parties to be secure and trusted; secondly, the two-party collaboration security still needs to be improved. …”
Get full text
Article -
16
British policy in Iran, 1941-1946: the role of the Tudeh Party
Published 2021“…This is a study of British policy during the British–Soviet occupation of Iran from 1941 to 1946, as understood through British attitudes towards and opinions of the Tudeh Party. This thesis makes two main arguments. Firstly, that British policy was robust and flexible enough to withstand and adjust to changes in circumstance when seeking to prioritise its interests at any given time during the occupation. …”
Thesis -
17
Can independent directors prevent abusive related party transactions?
Published 2015“…Abusive related party transactions (RPTs) have been highlighted as one of the major concerns after the 1997 Asian financial crisis.Since the crisis, many reforms to the law and regulation systems have been taken by the Asian countries, including Malaysia, to curb abusive RPTs.A key problem with RPTs is that the transactions are influenced by the relationship between parties involved in the transactions.Many abusive RPTs cases in Asia, such as Satyam Computers Ltd (India), Transmile Group Berhad (Malaysia), Asia Pulp and Paper (Indonesia) and others, demonstrate how these transactions ultimately benefited the top management and controlling shareholders. …”
Get full text
Conference or Workshop Item -
18
-
19
Factors Affecting the Change in the Strategies of Sweden Democrat Party Behavior
Published 2023-09-01“…Therefore, governments should include only enough parties to ensure majority support in parliament (Riker, 1962).The formation of minority coalition governments is placed in this format. …”
Get full text
Article -
20
Verifiable three-party secure key exchange protocol based on eigenvalue
Published 2019-12-01“…In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that can resist man-in-the-middle attacks was proposed with the help of secret matrix eigenvalues.However,the validity of key exchange cannot be verified by the scheme,and counterfeiting by middlemen can’t be prevented.Then based on it,the secret matrix was reconstructed,where the matrix order was a large even number,and all the eigenvalues appeared in pairs,similar to the diagonal matrix.Based on the special secret matrix,the verification part which can be used to verify the legitimacy of the communication party was introduced to the scheme,and the verifiable three-party key exchange protocol based on the eigenvalue was given.The protocol not only solved the problem of three-party key exchange,but also verified identity legitimacy.It is proved that it’s feasible to design a three-party key exchange protocol by the eigenvalue.The final protocol is both secure and efficient.…”
Get full text
Article