The Paper

Results: 73940



#Item
41Economy / Microfinance / Economic development / Poverty / Social economy / Microcredit / FINCA International / Muhammad Yunus / Grameen Bank / Micro-enterprise / Accion International / Kashf Foundation

A-1090 Wien, Sensengasse 3 • Tel.: + • e-mail: • Internet:http://www.oefse.at Working Paper 39 The Age of Microfinance: Destroying Latin American Economies from the Bottom Up

Add to Reading List

Source URL: www.networkideas.org

Language: English - Date: 2016-08-13 21:42:26
42Notary / Law / Common law / Comparative law / Notary public / ENotary

FORM LIAISON-EZ (REVNOTE: Liaisons have the option of filing online or on paper. If you choose to file on line you must also provide the hard copy original after filing on line; please type or print in ink on

Add to Reading List

Source URL: lobby.ncsbe.gov

Language: English - Date: 2018-09-26 08:35:32
43Geometry / Abstract algebra / Algebra / Algebraic geometry / Differential topology / Algebraic topology / Complex manifolds / Moduli theory / Cobordism / Hilbert scheme / Projective variety / Chern class

Grivaux, Julien Topological properties of Hilbert schemes of almost-complex four-manifolds. II. (English) Zbl  Geom. Topol. 15, No. 1, In the paper under review, the author studies the ratio

Add to Reading List

Source URL: jgrivaux.perso.math.cnrs.fr

Language: English - Date: 2018-03-18 08:56:10
44Academic publishing / Publishing / Open access / Electronic publishing / Public sphere / Article processing charge / OA / Electronic journal / Subscription business model / Project DEAL / Hybrid open-access journal

Briefing Paper Open Access Business Models and Current Trends in the Open Access Publishing System A pril 2016 April 2016

Add to Reading List

Source URL: www.scienceeurope.org

Language: English - Date: 2016-04-05 04:15:52
45Ei Compendex / Academic publishing / Publishing / Scholarly communication

2019 The 9th International Conference on Advanced Materials Research ICAMR 2019 CALL FOR PAPER January 24-27, 2019

Add to Reading List

Source URL: www.icamr.org

Language: English - Date: 2018-08-01 04:22:34
46Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
47Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-12-13 06:49:27
48Women's Islamic Games

Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16) Errata Slip In the paper “Be Fast, Cheap and in Control with SwitchKV” by Xiaozhou Li and Raghav Sethi, Princeton

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
    49Computing / World Wide Web / Computer security / Internet privacy / Internet censorship / Content-control software / Digital rights management / Cross-origin resource sharing / HTTP cookie / Cross-site request forgery / Web server / Web crawler

    Statement from the SIGCOMM 2015 Program Committee: The SIGCOMM 2015 PC appreciated the technical contributions made in this paper, but found the paper controversial because some of the experiments the authors conducted r

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2015-07-29 16:55:46
    50Cryptography / Public-key cryptography / Digital signature / Signcryption / Key / ID-based encryption / RSA / Encryption

    A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version, which appears as IACR ePrint Archive RecordKey-Versatile Signatures and Applications: RKA, KDM and Jo

    Add to Reading List

    Source URL: smeiklej.com

    Language: English - Date: 2018-10-23 14:58:02
    UPDATE