Search Results

There are 3256514 results for: content related to: Revocation of the Reinstatement of the “Mexico City Policy” on US Family Planning Assistance

  1. Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks

    Wireless Communications and Mobile Computing

    Volume 11, Issue 2, February 2011, Pages: 146–162, Sudip Misra, Sumit Goswami, Gyan Prakash Pathak and Nirav Shah

    Article first published online : 1 OCT 2009, DOI: 10.1002/wcm.839

  2. The Revocation of the Edict of Nantes

    History

    Volume 73, Issue 237, February 1988, Pages: 63–73, Menna Prestwich

    Article first published online : 18 DEC 2007, DOI: 10.1111/j.1468-229X.1988.tb02147.x

  3. AUTOMOBILE: THE UNIFORM COMMERCIAL CODE TO THE RESCUE THE WESTINGHOUSE URANIUM CONTRACTS: COMMERCIAL REVOCATION OF ACCEPTANCE AND THE DEFECTIVE

    American Business Law Journal

    Volume 18, Issue 2, June 1980, Pages: 303–321, JAMES M. HIGHSMITH and REX A. HAVENS

    Article first published online : 9 OCT 2008, DOI: 10.1111/j.1744-1714.1980.tb00046.x

  4. Short-Term Effects of Sanctioning Reform on Parole Officers' Revocation Decisions

    Law & Society Review

    Volume 45, Issue 2, June 2011, Pages: 371–400, Benjamin Steiner, Lawrence F. Travis III, Matthew D. Makarios and Benjamin Meade

    Article first published online : 25 MAY 2011, DOI: 10.1111/j.1540-5893.2011.00440.x

  5. Data Security in Vehicular Communication Networks

    VANET: Vehicular Applications and Inter-Networking Technologies

    André Weimerskirch, Jason J Haas, Yih-Chun Hu, Kenneth P Laberteaux, Pages: 299–363, 2009

    Published Online : 19 NOV 2009, DOI: 10.1002/9780470740637.ch9

  6. Revocation

    Juvenile and Family Court Journal

    Volume 34, Issue 2, May 1983, Pages: 49–66, Judge Daniel G. Heely

    Article first published online : 14 JUL 2009, DOI: 10.1111/j.1755-6988.1983.tb01524.x

  7. Novel distributed key revocation scheme for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1271–1280, Chih-Hung Chao, Ching-Fang Yang, Po-Ting Lin and Jung-Shian Li

    Article first published online : 18 JAN 2013, DOI: 10.1002/sec.707

  8. Efficient revocable identity-based encryption from multilinear maps

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3511–3522, Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng and Qixiang Mei

    Article first published online : 11 MAY 2015, DOI: 10.1002/sec.1274

  9. On the use of Attribute-Based Encryption for multimedia content protection over Information-Centric Networks

    Transactions on Emerging Telecommunications Technologies

    Volume 25, Issue 4, April 2014, Pages: 422–435, John P. Papanis, Stavros I. Papapanagiotou, Aziz S. Mousas, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris

    Article first published online : 17 OCT 2013, DOI: 10.1002/ett.2722

  10. Light-weight group signatures with time-bound membership

    Security and Communication Networks

    Lukas Malina, Jan Hajny and Vaclav Zeman

    Article first published online : 30 OCT 2015, DOI: 10.1002/sec.1383

  11. Measuring the performance of movement-assisted certificate revocation list distribution in VANET

    Wireless Communications and Mobile Computing

    Volume 11, Issue 7, July 2011, Pages: 888–898, Jiming Chen, Xianghui Cao, Yu Zhang, Weiqiang Xu and Youxian Sun

    Article first published online : 8 OCT 2009, DOI: 10.1002/wcm.858

  12. Privacy Protection with Group Signatures

    Vehicle Safety Communications: Protocols, Security, and Privacy

    Luca Delgrossi, Tao Zhang, Pages: 274–294, 2012

    Published Online : 13 SEP 2012, DOI: 10.1002/9781118452189.ch18

  13. Aggregate Risk and the Choice between Cash and Lines of Credit

    The Journal of Finance

    Volume 68, Issue 5, October 2013, Pages: 2059–2116, VIRAL V. ACHARYA, HEITOR ALMEIDA and MURILLO CAMPELLO

    Article first published online : 10 SEP 2013, DOI: 10.1111/jofi.12056

  14. A unified and flexible solution for integrating CRL and OCSP into PKI applications

    Software: Practice and Experience

    Volume 39, Issue 10, July 2009, Pages: 891–921, Diana Berbecaru, Amarkumar Desai and Antonio Lioy

    Article first published online : 11 FEB 2009, DOI: 10.1002/spe.918

  15. SDRP: a secure distributed revocation protocol for vehicular environments

    Security and Communication Networks

    Volume 9, Issue 4, 10 March 2016, Pages: 279–289, Noureddine Chaib, Nasreddine Lagraa, Mohamed Bachir Yagoubi and Abderrahmane Lakas

    Article first published online : 30 MAY 2012, DOI: 10.1002/sec.561

  16. The impact of key assignment on VANET privacy

    Security and Communication Networks

    Volume 3, Issue 2-3, March - June 2010, Pages: 233–249, Jason J. Haas, Yih-Chun Hu and Kenneth P. Laberteaux

    Article first published online : 21 SEP 2009, DOI: 10.1002/sec.143

  17. “EMERGING” LEMON CAR LAWS

    American Business Law Journal

    Volume 24, Issue 1, March 1986, Pages: 87–103, MARY B. KEGLEY and JANINE S. HILLER

    Article first published online : 22 AUG 2007, DOI: 10.1111/j.1744-1714.1986.tb00489.x

  18. Administrative Reinstatement Interlock Programs: Florida, A 10-Year Study

    Alcoholism: Clinical and Experimental Research

    Volume 37, Issue 7, July 2013, Pages: 1243–1251, Robert B. Voas, Anthony S. Tippetts and Milton Grosz

    Article first published online : 26 FEB 2013, DOI: 10.1111/acer.12078

  19. You have free access to this content
    Efficient broadcast key distribution with dynamic revocation

    Security and Communication Networks

    Volume 1, Issue 4, July/August 2008, Pages: 351–362, Lynn Batten and Xun Yi

    Article first published online : 9 JUL 2008, DOI: 10.1002/sec.37

  20. Revocable and anonymous searchable encryption in multi-user setting

    Concurrency and Computation: Practice and Experience

    Yinbin Miao, Jianfeng Ma and Zhiquan Liu

    Article first published online : 7 OCT 2015, DOI: 10.1002/cpe.3608