-
21
Réversibilité du mépris dans Bouvard et Pécuchet ou comment « saper les bases » de la société
Published 2023-06-01“…The impossibility of stabilising the points of view expressed in this way leads us to observe an “equality of everything” that is a joyfully denigrating impersonality.…”
Get full text
Article -
22
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01“…The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. …”
Get full text
Article -
23
ALEXEY LOSEV: LIFE AND DESTINY OF A PHILOSOPHER
Published 2022-05-01“…In this aspect, the fate of the philosopher appears as a personification of a contemporary historical era that allows us to understand history not as an objective impersonal process, but as a drama of lives and ideas. …”
Get full text
Article -
24
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01“…The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.…”
Get full text
Article -
25
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…Recently, Park et al. pointed that Cao and Ge’s three-factor authentication scheme suffers from offline identity guessing attack and server impersonation attack. They also proposed a new scheme after presenting the corresponding cryptanalysis. …”
Get full text
Article -
26
News Writing for Print
Published 2015-02-01“… A good print news story will contain the following components: inverted pyramid structure, five Ws and H, leads, impersonal reporting, news writing techniques, quotations and attributions, Associated Press Style, and proper grammar and punctuation. …”
Get full text
Article -
27
News Writing for Print
Published 2015-02-01“… A good print news story will contain the following components: inverted pyramid structure, five Ws and H, leads, impersonal reporting, news writing techniques, quotations and attributions, Associated Press Style, and proper grammar and punctuation. …”
Get full text
Article -
28
Power and authority in Matthew's gospel
Published 2011-12-01“…Herod, Antipas and Pilate specifically impersonate this foreign domination. Apparently these figures have unlimited power which leaves Jesus and his followers as exposed victims. …”
Get full text
Article -
29
Efficient identification protocol provably secure in standard model
Published 2009-01-01“…The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. …”
Get full text
Article -
30
The Tennis Shoe Army and Leviathan: Relics and Specters of Big Government in The Road
Published 2017-12-01“…To the extent that parallels can be drawn between the novel’s presentation of a tennis shoe army on the march, which resembles dream-like processions in other McCarthy novels, and Thomas Hobbes’ vision of an absolutist government as Leviathan, this essay argues that The Road can be seen as conveying an aversion to the impersonal rule of the bureaucratic state.…”
Get full text
Article -
31
Cesty evropské historiografie k diplomacii raného novověku
Published 2013-12-01“… While positivist science of the 19th century perceived the history of diplomacy as the history of impersonal state formations, the 20th century began, behind international treaties and complicated negotiations, to see persons of individual diplomats and their closest surroundings. …”
Get full text
Article -
32
Flaubert lecteur : une histoire des écritures
Published 2009-12-01“…We find on the one hand the admired figures of the past, whether they be the great naïve geniuses who inspire Flaubert’s dogma of impersonality, or the masters of the classical age, who remind the inspired writer to be patient. …”
Get full text
Article -
33
Personal reboot and survival
Published 2020-10-01“…It is concluded that the main goals of critical attacks of these arguments are the temporal mismatch of psychological connectedness and continuity as well as the reductionist claim that all the facts what matters for survival can be described in an impersonal way…”
Get full text
Article -
34
Analysis and improvement of sensor networks security protocol
Published 2011-01-01“…A suit of security protocols for sensor networks was presented by A.Perrig.The security of the protocols was analyzed,and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder.In that case,the intruder impersonates the node and creates false requests.An improved protocol to this attack was proposed.The security of improved protocol was analyzed by the extended strand spaces,where two main security properties,authenticity and confidentiality,were checked.And the analysis proves the correctness of the protocol.The extended strand spaces also gives a practical base for further application of strand spaces in analyzing complicated protocols.…”
Get full text
Article -
35
THE TRANSLATION OF INFORMATION PATTERN FOR I CARE A LOT MOVIE SUBTITLE FROM ENGLISH TO INDONESIAN
Published 2021-10-01“…The results of the study indicate that (i) there are parallels in information pattern urgency, namely foreground position tends to be in the beginning of the speech; (ii) the misalignment of information status occurs in sentences translation with it subject and that impersonal and in interrogative and imperative sentences translation, as well as in sentences translation with the non-doer subject. …”
Get full text
Article -
36
It girl, it bag et le pronom it : le sens du pronom neutre non anaphorique
Published 2012-11-01“…‘Neutral’ has to be understood as ‘inclusive’ and ‘impersonal’ as making the speaker ‘implicit’.…”
Get full text
Article -
37
An Eye for an Eye: Brian Evenson’s Merciless Art of Exposure
Published 2014-01-01“…Aiming at transparency or blankness, Evenson’s impersonal writing, though controlled and measured, introduces minimal distance between the reader and the acts of violence it depicts, as if trying to disappear behind them. …”
Get full text
Article -
38
A Madame Bovary’s Daughter: David Lean’s Visual Transliteration of Flaubert
Published 2014-11-01“…This article deems a different cinematic approach with a film that has not received full attention: Ryan’s Daughter by David Lean. The impersonal narration and sensual expression of the novel are reassessed in light of this loose adaptation. …”
Get full text
Article -
39
A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN
Published 2015-12-01“…This scheme combines mutual authentication and dynamic identity to resist the impersonation attack, smart card stolen attack, distributed denial of service attack, dictionary attack and replay attack. …”
Get full text
Article -
40
Multi-factor identity authentication scheme for trusted sharing of cultural resources
Published 2023-10-01“…To solve the problems of data leakage and identity impersonation caused by traditional single factor authentication, a multi-factor identity authentication scheme based on blockchain was proposed for the trusted sharing of cultural resources.Considering a variety of identity factors, a heterogeneous digital identity model was constructed using the tamper resistance and distribution of the blockchain distributed ledger.Through asymmetric encryption algorithm and exclusive OR (XOR) operation, the trusted reuse of heterogeneous digital identity and fast authentication of multi-agent access were realized.Security analysis and simulation results show that the proposed scheme outperforms existing multi-factor authentication schemes in terms of security and efficiency, and can effectively reduce the cost of identity authentication.…”
Get full text
Article