Search

Your search keyword '"Credential"' showing total 2,144 results

Search Constraints

Start Over You searched for: Descriptor "Credential" Remove constraint Descriptor: "Credential"
2,144 results on '"Credential"'

Search Results

101. The moral licensing effect between work effort and unethical pro-organizational behavior: The moderating influence of Confucian value

102. Plain text passwords: A forensic RAM-raid

103. Efficient blacklistable anonymous credential system with reputation using a pairing‐based accumulator

104. Indistinguishability and unextractablility of password-based authentication in blockchain

105. What’s Love Got to Do With It? Toward a Theory of Benevolent Whiteness in Education

106. The Fate of the Master’s in Social Work (MSW) Degree: Will the Practice Doctorate Replace It as the Profession’s Flagship Credential?

107. Students’ motivating influences for selecting dental hygiene and a 4‐year degree: A retrospective study

108. The Nudge to Finish Up: A National Study of Community College Near-Completion Students

109. Exploring quality management system maturity of the accredited hospitals

110. Examining the barriers to BSN prelicensure education among ADN students: A quantitative follow-up

111. Hiring and Credentialing of Nurse Practitioners as Hospitalists: A National Workforce Analysis

112. Sometimes a Long and Winding Road: An Exploration of Kalamazoo Promise Stop Out and Reenrollment

113. Students as Consumers: Retaining Engineering Students by Designing Learner-Centric Courses of Value

114. Hiring Requirements and Qualifications of School Food Authority Directors Changed in Some Districts After Implementation of US Department of Agriculture Professional Standards

115. HomeShield: A Credential-Less Authentication Framework for Smart Home Systems

116. A Profile of Returning Graduates in Community College Occupational Education A Decade Later

117. The Importance of Professional Discourse for the Continual Advancement of Practice Standards: The RBT® as a Case in Point

118. Tracking cryptographic keys and encrypted data using position verification

119. ECCOE: Toward a Robust Solution for the Cross-Institutional Recognition and Validation of Prior Learning

120. A secure n-secret based client authentication protocol for 802.11 WLANs

121. Balancing Privacy and Accountability for Industrial Mortgage Management

122. Role delineation for pharmacotherapy specialists: Re‐evaluating the clinical relevance of a <scp>patient‐centered</scp> credential

123. Chinese adult higher education as a heterotopia

124. Structured Neonatal Point-of-Care Ultrasound Training Program

125. A practical solution to clone problem in anonymous information system

126. Reflective Writing in a Principal Preparation Program

127. Critical stance within a community of inquiry in an advanced mathematics course for pre-service teachers

128. Mandate (credential) as mitigation culture on local community of Sindang Barang

129. Strategic Brand Model Proposal for Patient Satisfaction and Private Healthcare Preferences

130. Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation

131. What the HEC-C? An Analysis of the Healthcare Ethics Consultant-Certified Program: One Year in

132. Quality Assurance for the New Credentialing Market

133. Reflections on Education in a New Era of Work and Learning

134. Survey of health-system pharmacy administration and leadership residencies

135. Professional credential program: impacting early childhood inclusive learning environments

136. Foreign Credential Recognition and Immigrants’ Chances of Being Hired for Skilled Jobs—Evidence from a Survey Experiment Among Employers

137. Token-Based Access Control

138. Android Data-Clone Attack via Operating System Customization

139. Vulnerability Detection on Android Apps–Inspired by Case Study on Vulnerability Related With Web Functions

140. Factors Affecting Academic Performance of First-Year University Students: A Case of a Vietnamese University

141. Is credential stuffing the new phishing?

142. Getting Started With Open Badges and Open Microcredentials

143. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework

144. Communicating Credential Value

145. Laying the Foundation for a Micro-Credential Strategy

146. The Complex Case of Noncredit Credential Innovation in Public Universities

147. A courageous journey: Experiences of migrant Philippine nurses in Norway

148. Zero-Knowledge Proofs Do Not Solve the Privacy-Trust Problem of Attribute-Based Credentials: What if Alice Is Evil?

149. An Efficient Blacklistable Anonymous Credentials without TTP of Tracing Authority Using Pairing-Based Accumulator

150. Keeping confidentiality of sensitive attributes in credential during trust negotiation

Catalog

Books, media, physical & digital resources