Showing 21 - 40 results of 93 for search '"Impersonator"', query time: 0.04s Refine Results
  1. 21

    Réversibilité du mépris dans Bouvard et Pécuchet ou comment « saper les bases » de la société by Isabelle Pitteloud

    Published 2023-06-01
    “…The impossibility of stabilising the points of view expressed in this way leads us to observe an “equality of everything” that is a joyfully denigrating impersonality.…”
    Get full text
    Article
  2. 22

    Reconstructing a lightweight security protocol in the radio‐frequency identification systems by Alireza Abdellahi Khorasgani, Mahdi Sajadieh, Mohammad Rouhollah Yazdani

    Published 2023-07-01
    “…The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. …”
    Get full text
    Article
  3. 23

    ALEXEY LOSEV: LIFE AND DESTINY OF A PHILOSOPHER by Lyudmila B. Logunova, Yuriy Yu. Petrunin

    Published 2022-05-01
    “…In this aspect, the fate of the philosopher appears as a personification of a contemporary historical era that allows us to understand history not as an objective impersonal process, but as a drama of lives and ideas. …”
    Get full text
    Article
  4. 24

    Identity-based roaming protocol with anonymity for heterogeneous wireless networks by JIANG Qi1, MA Jian-feng1, LI Guang-song1, LIU Hong-yue1

    Published 2010-01-01
    “…The security flaws of an identity-based authentication model were analyzed.The scheme failed to achieve entity authentication due to identity impersonation attack.Then,an improved authentication scheme was proposed to realize anonymous roaming in heterogeneous wireless networks.The authentication scheme improves the original one in two aspects.Firstly,the scheme remedies the security flaws and is provably secure in the CK model.Secondly,the scheme simplifies the protocol interaction and it is more efficient.…”
    Get full text
    Article
  5. 25

    Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps by Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu

    Published 2019-04-01
    “…Recently, Park et al. pointed that Cao and Ge’s three-factor authentication scheme suffers from offline identity guessing attack and server impersonation attack. They also proposed a new scheme after presenting the corresponding cryptanalysis. …”
    Get full text
    Article
  6. 26

    News Writing for Print by Ricky W. Telg

    Published 2015-02-01
    “… A good print news story will contain the following components: inverted pyramid structure, five Ws and H, leads, impersonal reporting, news writing techniques, quotations and attributions, Associated Press Style, and proper grammar and punctuation. …”
    Get full text
    Article
  7. 27

    News Writing for Print by Ricky W. Telg

    Published 2015-02-01
    “… A good print news story will contain the following components: inverted pyramid structure, five Ws and H, leads, impersonal reporting, news writing techniques, quotations and attributions, Associated Press Style, and proper grammar and punctuation. …”
    Get full text
    Article
  8. 28

    Power and authority in Matthew's gospel by F. P. Viljoen

    Published 2011-12-01
    “…Herod, Antipas and Pilate specifically impersonate this foreign domination. Apparently these figures have unlimited power which leaves Jesus and his followers as exposed victims. …”
    Get full text
    Article
  9. 29

    Efficient identification protocol provably secure in standard model by LI Yan-ping1, WANG Yu-min1

    Published 2009-01-01
    “…The new identification protocol is proven secure against impersonation under concurrent reset attack setting in standard model. …”
    Get full text
    Article
  10. 30

    The Tennis Shoe Army and Leviathan: Relics and Specters of Big Government in The Road by Robert Pirro

    Published 2017-12-01
    “…To the extent that parallels can be drawn between the novel’s presentation of a tennis shoe army on the march, which resembles dream-like processions in other McCarthy novels, and Thomas Hobbes’ vision of an absolutist government as Leviathan, this essay argues that The Road can be seen as conveying an aversion to the impersonal rule of the bureaucratic state.…”
    Get full text
    Article
  11. 31

    Cesty evropské historiografie k diplomacii raného novověku by Jiří Hrbek

    Published 2013-12-01
    “… While positivist science of the 19th century perceived the history of diplomacy as the history of impersonal state formations, the 20th century began, behind international treaties and complicated negotiations, to see persons of individual diplomats and their closest surroundings. …”
    Get full text
    Article
  12. 32

    Flaubert lecteur : une histoire des écritures by Philippe Dufour

    Published 2009-12-01
    “…We find on the one hand the admired figures of the past, whether they be the great naïve geniuses who inspire Flaubert’s dogma of impersonality, or the masters of the classical age, who remind the inspired writer to be patient. …”
    Get full text
    Article
  13. 33

    Personal reboot and survival by A. V. Nekhaev

    Published 2020-10-01
    “…It is concluded that the main goals of critical attacks of these arguments are the temporal mismatch of psychological connectedness and continuity as well as the reductionist claim that all the facts what matters for survival can be described in an impersonal way…”
    Get full text
    Article
  14. 34

    Analysis and improvement of sensor networks security protocol by YAN Li-li1, PENG Dai-yuan1, GAO Yue-xiang1

    Published 2011-01-01
    “…A suit of security protocols for sensor networks was presented by A.Perrig.The security of the protocols was analyzed,and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder.In that case,the intruder impersonates the node and creates false requests.An improved protocol to this attack was proposed.The security of improved protocol was analyzed by the extended strand spaces,where two main security properties,authenticity and confidentiality,were checked.And the analysis proves the correctness of the protocol.The extended strand spaces also gives a practical base for further application of strand spaces in analyzing complicated protocols.…”
    Get full text
    Article
  15. 35

    THE TRANSLATION OF INFORMATION PATTERN FOR I CARE A LOT MOVIE SUBTITLE FROM ENGLISH TO INDONESIAN by Sajarwa Sajarwa, Aulia Addinillah A, Nadia Khumairo Mash’umah, Cynthia Yanda, Ahmad Khalid M. Al-maziidi

    Published 2021-10-01
    “…The results of the study indicate that (i) there are parallels in information pattern urgency, namely foreground position tends to be in the beginning of the speech; (ii) the misalignment of information status occurs in sentences translation with it subject and that impersonal and in interrogative and imperative sentences translation, as well as in sentences translation with the non-doer subject. …”
    Get full text
    Article
  16. 36

    It girl, it bag et le pronom it : le sens du pronom neutre non anaphorique by Julie Neveux

    Published 2012-11-01
    “…‘Neutral’ has to be understood as ‘inclusive’ and ‘impersonal’ as making the speaker ‘implicit’.…”
    Get full text
    Article
  17. 37

    An Eye for an Eye: Brian Evenson’s Merciless Art of Exposure by Jean-Yves Pellegrin

    Published 2014-01-01
    “…Aiming at transparency or blankness, Evenson’s impersonal writing, though controlled and measured, introduces minimal distance between the reader and the acts of violence it depicts, as if trying to disappear behind them. …”
    Get full text
    Article
  18. 38

    A Madame Bovary’s Daughter: David Lean’s Visual Transliteration of Flaubert by Franck Dalmas

    Published 2014-11-01
    “…This article deems a different cinematic approach with a film that has not received full attention: Ryan’s Daughter by David Lean. The impersonal narration and sensual expression of the novel are reassessed in light of this loose adaptation. …”
    Get full text
    Article
  19. 39

    A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN by Liping Liu

    Published 2015-12-01
    “…This scheme combines mutual authentication and dynamic identity to resist the impersonation attack, smart card stolen attack, distributed denial of service attack, dictionary attack and replay attack. …”
    Get full text
    Article
  20. 40

    Multi-factor identity authentication scheme for trusted sharing of cultural resources by Miaomiao WANG, Lanlan RUI, Siya XU

    Published 2023-10-01
    “…To solve the problems of data leakage and identity impersonation caused by traditional single factor authentication, a multi-factor identity authentication scheme based on blockchain was proposed for the trusted sharing of cultural resources.Considering a variety of identity factors, a heterogeneous digital identity model was constructed using the tamper resistance and distribution of the blockchain distributed ledger.Through asymmetric encryption algorithm and exclusive OR (XOR) operation, the trusted reuse of heterogeneous digital identity and fast authentication of multi-agent access were realized.Security analysis and simulation results show that the proposed scheme outperforms existing multi-factor authentication schemes in terms of security and efficiency, and can effectively reduce the cost of identity authentication.…”
    Get full text
    Article