-
41
Authentication Scheme Based on Agents for Heterogeneous Cloud
Published 2013-03-01“…Considering the comp1exity of dep1oying network nodes, 1arge amount of ca1cu1ation and frequent mutua1 messages for heterogeneous c1oud, two service patterns, i.e.authentication agent and service agent were proposed, A1so, the proxy digita1 signature schemes with 1ower handshaking numbers were devised and the efficiency of authentication imp1ementation was improved.In addition, the scheme can effective1y guard against the rep1ay attack, the impersonation attack and the man-in-the-midd1e attack of the ma1icious nodes,and so on.…”
Get full text
Article -
42
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01“…However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. …”
Get full text
Article -
43
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01“…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
Get full text
Article -
44
A case for two voices in Old Church Slavonic – reflexively marked OCS verbs
Published 2015-12-01“…Consequently, the expressions headed by anticausatives, reflexives, subject experiencer verbs, statives, and reciprocals (as well as dative impersonal structures) encroach on the area of semantics belonging in Modern Slavic to be the realm expressed in terms of passive morpho-syntax. …”
Get full text
Article -
45
Attribute-based authenticated key agreement protocol supporting revocation
Published 2014-05-01“…The pro-tocol can also provide weak perfect forward secrecy and key compromise impersonation resilience.…”
Get full text
Article -
46
Hedging functions of extraposed that-clauses in English and declarative subject da-clauses in Croatian academic writing
Published 2020-12-01“…In academic writing stance is often conveyed by means of extraposed that-clauses (It is possible that the results were misinterpreted.). The impersonal form of a matrix predicate allows writers to express attitudes without assuming responsibility for the claim, which renders extraposition particularly convenient for hedging (Biber et al., 1999). …”
Get full text
Article -
47
Costumed doubles and avatars in Janieta Eyre’s photographic self-portraits
Published 2019-06-01“…In these performative self-fictions the costume constitutes a prosthetic device. Her burlesque impersonations address gender identity in a subversive way. …”
Get full text
Article -
48
« Parlez-vous franglais ? » La galimafrée des langues dans Henry V
Published 2022-01-01“…It is in part up to the actor to individualize speech and find idiosyncrasies that will enable him to impersonate a particular character. Similarly, gestures and stagecraft can contribute to make up for the losses and deficiencies in the translation of the ‘French’ scenes in Henry V, whereas neither conserving Shakespeare’s dated and faulty French nor its translation into modern French is true to the original bilingualism of the play. …”
Get full text
Article -
49
Analysis of security extension protocol in e-mail system
Published 2020-12-01“…E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.…”
Get full text
Article -
50
Stapled peptides: targeting protein-protein interactions in drug development
Published 2024-04-01“…Protein-protein interactions (PPIs) impersonate a significant role in many biological processes and are potential therapeutic targets in numerous human diseases. …”
Get full text
Article -
51
L’Orient-souvenir. Le surgissement du passé autobiographique dans le périple méditerranéen de Flaubert
Published 2019-12-01“…Before he espoused the principle of literary impersonality, Flaubert considered travel writing as a form in which the ‘I’ could reveal itself freely; it re-emerged in more indirect ways in the works that followed.…”
Get full text
Article -
52
“Some Unholy Alloy”: Neoliberalism, Digital Modernity, and the Mechanics of Globalized Capital in Cormac McCarthy’s The Counselor
Published 2017-12-01“…I will propose that echoes of Blood Meridian (1985), which presented the duality of barbarism and capital, are audible and perpetuated under digital capitalism, a condition encompassing the expansion of increasingly impersonal and anonymized capital under neoliberal socio-economics, empowered by digital globalization. …”
Get full text
Article -
53
La moral y la ambivalencia de los bienes. Un análisis básico para la teoría de la justicia social
Published 2017-01-01“…Contra el esencialismo de las concepciones de la justicia social como desarrollo, se sostiene que los bienes se configuran siempre en relaciones recíprocas, nunca de manera objetiva e impersonal. El núcleo deontológico de la moral reside en la crítica de las formas de actuary reposa en una ontología natural, mientras que el amplio conjunto de creencias normativas que llamamos ética se basa en la crítica de los bienes y presupone una ontología dialéctica. …”
Get full text
Article -
54
A critical assessment of John Milbank's Christology
Published 2012-12-01“…In order to maintain his non-violent and poetic ontological position, Milbank needs to revert to a general, “high” and impersonal Christology, and disregard “low” Christology. …”
Get full text
Article -
55
Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature
Published 2024-11-01“…Security analysis shows that the scheme effectively resists correlation and impersonation attacks, with minimal computational overhead on RSU and vehicles, ensuring good efficiency and security during pseudonym certificate and anonymous authentication processes.…”
Get full text
Article -
56
Enactivism as an epistemology for science of complexity
Published 2023-02-01“…This strategy covers not only the ‘ecology’ of impersonal self-organising systems, but also the human mind, including the principles of complex thinking. …”
Get full text
Article -
57
“At the still point of the turning world:” T.S. Eliot and Gilles Deleuze
Published 2018-06-01“…Eliot’s concepts such as “objective correlative,” “dissociation of sensibility,” and “impersonal voice” echo the Deleuzean concept of art as the producer of “affects and percepts.” …”
Get full text
Article -
58
Provably secure biometric and PUF-based authentication for roaming service in global mobility network
Published 2025-02-01“…To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
Get full text
Article -
59
Environmental Ethics and the Need for Theory
Published 2023-03-01“…Its findings include the conclusions that our moral obligations (or responsibilities) extend to people and non-human creatures of the foreseeable future, as far as the impacts of present actions and policies can themselves be foreseen, that, that moral standing attaches to the possible people and other living creatures of the future, and (with Derek Parfit) that ethics is to some degree impersonal, being concerned with future quality of life for whoever lives in future centuries, whether they are currently identifiable or not. …”
Get full text
Article -
60
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. …”
Get full text
Article