Showing 41 - 60 results of 93 for search '"Impersonator"', query time: 0.04s Refine Results
  1. 41

    Authentication Scheme Based on Agents for Heterogeneous Cloud by Jiwen Guo, Xianwei Zhou

    Published 2013-03-01
    “…Considering the comp1exity of dep1oying network nodes, 1arge amount of ca1cu1ation and frequent mutua1 messages for heterogeneous c1oud, two service patterns, i.e.authentication agent and service agent were proposed, A1so, the proxy digita1 signature schemes with 1ower handshaking numbers were devised and the efficiency of authentication imp1ementation was improved.In addition, the scheme can effective1y guard against the rep1ay attack, the impersonation attack and the man-in-the-midd1e attack of the ma1icious nodes,and so on.…”
    Get full text
    Article
  2. 42

    Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks by Jun-Sub Kim, Jin Kwak

    Published 2014-04-01
    “…However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. …”
    Get full text
    Article
  3. 43

    Two-factor wearable device authentication protocol based on PUF and IPI by Jun WANG, Shu-bo LIU, Cai LIANG, Yong-kai LI

    Published 2017-06-01
    “…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
    Get full text
    Article
  4. 44

    A case for two voices in Old Church Slavonic – reflexively marked OCS verbs by Anna Malicka-Kleparska

    Published 2015-12-01
    “…Consequently, the expressions headed by anticausatives, reflexives, subject experiencer verbs, statives, and reciprocals (as well as dative impersonal structures) encroach on the area of semantics belonging in Modern Slavic to be the realm expressed in terms of passive morpho-syntax. …”
    Get full text
    Article
  5. 45

    Attribute-based authenticated key agreement protocol supporting revocation by Qiang LI, Deng-guo FENG, Li-wu ZHANG

    Published 2014-05-01
    “…The pro-tocol can also provide weak perfect forward secrecy and key compromise impersonation resilience.…”
    Get full text
    Article
  6. 46

    Hedging functions of extraposed that-clauses in English and declarative subject da-clauses in Croatian academic writing by Varga Mirna

    Published 2020-12-01
    “…In academic writing stance is often conveyed by means of extraposed that-clauses (It is possible that the results were misinterpreted.). The impersonal form of a matrix predicate allows writers to express attitudes without assuming responsibility for the claim, which renders extraposition particularly convenient for hedging (Biber et al., 1999). …”
    Get full text
    Article
  7. 47

    Costumed doubles and avatars in Janieta Eyre’s photographic self-portraits by Valérie MORISSON

    Published 2019-06-01
    “…In these performative self-fictions the costume constitutes a prosthetic device. Her burlesque impersonations address gender identity in a subversive way. …”
    Get full text
    Article
  8. 48

    « Parlez-vous franglais ? » La galimafrée des langues dans Henry V  by Jean-Michel Déprats

    Published 2022-01-01
    “…It is in part up to the actor to individualize speech and find idiosyncrasies that will enable him to impersonate a particular character. Similarly, gestures and stagecraft can contribute to make up for the losses and deficiencies in the translation of the ‘French’ scenes in Henry V, whereas neither conserving Shakespeare’s dated and faulty French nor its translation into modern French is true to the original bilingualism of the play. …”
    Get full text
    Article
  9. 49

    Analysis of security extension protocol in e-mail system by Jingjing SHANG, Yujia ZHU, Qingyun LIU

    Published 2020-12-01
    “…E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.…”
    Get full text
    Article
  10. 50

    Stapled peptides: targeting protein-protein interactions in drug development by Qian Zhang, Ziyang Wang, Xiaohan Mei, Quan Chen, Chunqiu Zhang

    Published 2024-04-01
    “…Protein-protein interactions (PPIs) impersonate a significant role in many biological processes and are potential therapeutic targets in numerous human diseases. …”
    Get full text
    Article
  11. 51

    L’Orient-souvenir. Le surgissement du passé autobiographique dans le périple méditerranéen de Flaubert by Sarga Moussa

    Published 2019-12-01
    “…Before he espoused the principle of literary impersonality, Flaubert considered travel writing as a form in which the ‘I’ could reveal itself freely; it re-emerged in more indirect ways in the works that followed.…”
    Get full text
    Article
  12. 52

    “Some Unholy Alloy”: Neoliberalism, Digital Modernity, and the Mechanics of Globalized Capital in Cormac McCarthy’s The Counselor by David Deacon

    Published 2017-12-01
    “…I will propose that echoes of Blood Meridian (1985), which presented the duality of barbarism and capital, are audible and perpetuated under digital capitalism, a condition encompassing the expansion of increasingly impersonal and anonymized capital under neoliberal socio-economics, empowered by digital globalization. …”
    Get full text
    Article
  13. 53

    La moral y la ambivalencia de los bienes. Un análisis básico para la teoría de la justicia social by Ciro Alegría-Varona

    Published 2017-01-01
    “…Contra el esencialismo de las concepciones de la justicia social como desarrollo, se sostiene que los bienes se configuran siempre en relaciones recíprocas, nunca de manera objetiva e impersonal. El núcleo deontológico de la moral reside en la crítica de las formas de actuary reposa en una ontología natural, mientras que el amplio conjunto de creencias normativas que llamamos ética se basa en la crítica de los bienes y presupone una ontología dialéctica. …”
    Get full text
    Article
  14. 54

    A critical assessment of John Milbank's Christology by N. Vorster

    Published 2012-12-01
    “…In order to maintain his non-violent and poetic ontological position, Milbank needs to revert to a general, “high” and impersonal Christology, and disregard “low” Christology. …”
    Get full text
    Article
  15. 55

    Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature by LIU Zhaoman, YANG Yafang, NING Jianting, ZHAO Yunlei

    Published 2024-11-01
    “…Security analysis shows that the scheme effectively resists correlation and impersonation attacks, with minimal computational overhead on RSU and vehicles, ensuring good efficiency and security during pseudonym certificate and anonymous authentication processes.…”
    Get full text
    Article
  16. 56

    Enactivism as an epistemology for science of complexity by P. V. Opolev

    Published 2023-02-01
    “…This strategy covers not only the ‘ecology’ of impersonal self-organising systems, but also the human mind, including the principles of complex thinking. …”
    Get full text
    Article
  17. 57

    “At the still point of the turning world:” T.S. Eliot and Gilles Deleuze by Zekiye ANTAKYALIOGLU

    Published 2018-06-01
    “…Eliot’s concepts such as “objective correlative,” “dissociation of sensibility,” and “impersonal voice” echo the Deleuzean concept of art as the producer of “affects and percepts.” …”
    Get full text
    Article
  18. 58

    Provably secure biometric and PUF-based authentication for roaming service in global mobility network by E. Haodudin Nurkifli

    Published 2025-02-01
    “…To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
    Get full text
    Article
  19. 59

    Environmental Ethics and the Need for Theory by Robin Attfield

    Published 2023-03-01
    “…Its findings include the conclusions that our moral obligations (or responsibilities) extend to people and non-human creatures of the foreseeable future, as far as the impacts of present actions and policies can themselves be foreseen, that, that moral standing attaches to the possible people and other living creatures of the future, and (with Derek Parfit) that ethics is to some degree impersonal, being concerned with future quality of life for whoever lives in future centuries, whether they are currently identifiable or not. …”
    Get full text
    Article
  20. 60

    A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing by Jue-Sam Chou

    Published 2012-01-01
    “…In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. …”
    Get full text
    Article