Showing 61 - 80 results of 93 for search '"Impersonator"', query time: 0.05s Refine Results
  1. 61

    Féerie pour un scandale : l’art et la morale dans Lolita (1958) de Vladimir Nabokov by Jacques Sohier

    Published 2015-03-01
    “…In the preface to Lolita, V. Nabokov impersonates the fictive John Ray and looks at transgression with both a moral and clinical intent. …”
    Get full text
    Article
  2. 62

    DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments by Min Su Song, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, Jong Hyuk Park

    Published 2014-01-01
    “…However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. …”
    Get full text
    Article
  3. 63

    Les services de Santé Sexuelle et Reproductive en Tunisie. Résultats d’une recherche qualitative auprès des jeunes usagers by Atf Gherissi, Francine Tinsa

    Published 2017-11-01
    “…This attitude seems to be sought by all the young people who, throughout the interviews and regardless the place of residence, have obviously often evoked their own experience by projecting their comments on young people in general and in an impersonal way. The results of this study provide relevant information for the future development of SRH services and structures so that they can become their effective users through adapting the national plan and strengthening its implementation. …”
    Get full text
    Article
  4. 64

    De l’intericonicité comme espace et temps (ré)créatif : les Video Portraits de Robert Wilson by Marie BOUCHET

    Published 2015-12-01
    “…Robert Downey Jr. is thus depicted as the corpse in Rembrandt’s “anatomy lesson”; Jeanne Moreau impersonates Mary Stuart; Lady Gaga poses as Marat in his bath. …”
    Get full text
    Article
  5. 65

    Passive biometric electronic lock via UHF RFID by Xiang ZOU, Jinsong HAN, Yuhang QU, Jian XIAO, Xian XU

    Published 2021-04-01
    “…A biometric lock design method was proposed based on the internal features of human body, namely PBLock.It used the backscattered RF signals to collect the impedance characteristics of human fingertips through the contact between human fingers and tags.The advantage of such authentication method is that the human impedance was not easy to be stolen, and it was fully integrated with the hardware characteristics of the device (RFID tags), which greatly increased the difficulty for the attacker to copy and clone.To ensure the availability and efficiency of the system, an optimization authentication mechanism was proposed by cutting tag antenna, which effectively improved the impedance sensitivity.Moreover, the feasibility of passive drive was discussed by using the electromagnetic energy advantage of RFID system.Through a large number of experimental evaluations, the authentication accuracy of PBLock can reach 96%, and the average time cost of a single authentication is 1.4 seconds.Some attack models were presented based on practical environment.The results show that PBLock can effectively prevent counterfeiting attack, impersonation attack and replay attack, which provides an opportunity for the secure application of new biometric electronic locks.…”
    Get full text
    Article
  6. 66

    Reading “Guillelme l’Amïable”: Hypertextuality and La Prise d’Orange by Lucas Wood

    Published 2021-06-01
    “…The Prise cultivates a somewhat anxious enjoyment of its subversion of epic norms by thematizing the “folly” of its protagonist, Guillelme, whose absurd impersonation of a courtly lover casts doubt upon his legitimacy as an epic hero and the Prise’s “authenticity” as a chanson de geste. …”
    Get full text
    Article
  7. 67

    Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography by Lili Wang

    Published 2014-01-01
    “…In this paper, we further analyze Islam and Biswas’ scheme and demonstrate that their scheme cannot resist password compromise impersonation attack. In order to remedy the weaknesses mentioned above, we propose an improved anonymous remote authentication scheme using smart card without using bilinear paring computation. …”
    Get full text
    Article
  8. 68

    Spoofing detection on adaptive authentication System‐A survey by Hind Baaqeel, Sunday Olusanya Olatunji

    Published 2022-03-01
    “…However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. …”
    Get full text
    Article
  9. 69

    A dual benchmarking study of facial forgery and facial forensics by Minh Tam Pham, Thanh Trung Huynh, Thanh Tam Nguyen, Thanh Toan Nguyen, Thanh Thi Nguyen, Jun Jo, Hongzhi Yin, Quoc Viet Hung Nguyen

    Published 2024-12-01
    “…A wide range of malicious applications have emerged, such as deepfake, fake news, defamation or blackmailing of celebrities, impersonation of politicians in political warfare, and the spreading of rumours to attract views. …”
    Get full text
    Article
  10. 70

    Scanning the business external environment for information: evidence from Greece by L. Kourteli

    Published 2005-01-01
    “…</b> The results show that perceived uncertainty of the general and task business external environment factors depend on the type of the environment, size of organization, and industry where the organizations operate; organizations adapt their scanning strategy to the complexity of the environment; personal sources of information seem to be more important than impersonal sources; external sources of information are equally important with internal sources; and higher levels of environmental uncertainty are associated with higher levels of scanning the various sources. …”
    Get full text
    Article
  11. 71

    La captura de lo imperceptible. Vida, política y afecto en las ficciones de Alan Pauls by Cecilia Sánchez Idiart

    Published 2018-05-01
    “…Por otro lado, a través de la elaboración de una estética impersonal de la percepción que asume el distanciamiento como premisa clave, estas ficciones imaginan imbricaciones alternativas entre la vida, la política y los cuerpos a partir de la indagación de la politicidad del afecto.…”
    Get full text
    Article
  12. 72

    The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations by Esra Merve Çalışkan

    Published 2024-12-01
    “…Thanks to AI, adversaries can now impersonate humans, manipulate data, eavesdrop on conversations, and exploit system weaknesses on an unprecedented scale. …”
    Get full text
    Article
  13. 73

    Cross-dressing and Empowerment in Anglo-Indian Fiction:Embracing Subaltern Invisibility by Jaine CHEMMACHERY

    Published 2019-06-01
    “…In another story by Kipling, “His Wedded Wife” (1887), a British soldier, often bullied by his masculine fellow-soldiers, once impersonates his officer’s wife so efficiently that gender passing finally earns him the respect of his companions. …”
    Get full text
    Article
  14. 74

    University Network Capital as an Element of the City’s Social Capital by R. A. Zayakina

    Published 2021-09-01
    “…Secondly, it expands the city’s social capital through impersonal trust, which convinces society that the university has some universal competence related to the life of the city and its people.…”
    Get full text
    Article
  15. 75

    Consuetudo Legis: Writing Down Customs in the Roman Empire (2nd–5th Century CE) by Soazick Kerneis

    Published 2024-08-01
    “…Of course, it would be presumptuous to transpose our modern categories and to consider laws as impersonal and general rules issued from sovereign powers, and customs as spontaneously generated uses that have been accepted by the social groups concerned. …”
    Get full text
    Article
  16. 76

    DESCARTES ON THE PHENOMENON OF MAN AND THE BOUNDARIES OF DOUBT by A. M. Malivskyi

    Published 2020-12-01
    “…Based on the tendency of anthropologization of Descartes’ basic project, I refute the widespread tendency to qualify Descartes’ position as a sceptic, which is based on superficial stereotypes about the impersonality of his philosophy. The modern reception of the thinker’s texts indicates the priority for him of the task of explicating the conditions of man’s realization of his own vocation in the Universe, which is supplemented by the idea of the limits of science and the doubt correlative to it. …”
    Get full text
    Article
  17. 77

    “Hi! My name is Pauline, but most of my friends just call me Paul”: Divine on stage by Jean DU VERGER

    Published 2019-06-01
    “…This paper contends that the different characters impersonated by Divine in his films tapped into Divine’s stage performances. …”
    Get full text
    Article
  18. 78

    RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks by Muhammad Tanveer, Saud Alhajaj Aldossari

    Published 2025-01-01
    “…Existing authentication mechanisms (AMs) are often vulnerable to attacks like impersonation and insider threats. This paper introduces a novel lightweight AM, called RAM-MEN that employs cryptography and physically unclonable functions (PUFs) to secure IoT-enabled MEC environments in the 6G era. …”
    Get full text
    Article
  19. 79

    Quantum Safe Multi-Factor User Authentication Protocol for Cloud-Assisted Medical IoT by Arman Ahmad, S. Jagatheswari

    Published 2025-01-01
    “…However, this framework presents security vulnerabilities, such as the risk of eavesdroppers exploiting public channels to intercept sensitive patient data or impersonate legitimate devices and services. Consequently, authentication between wearable devices and servers is essential before transmitting confidential information through open channels. …”
    Get full text
    Article
  20. 80

    Conspiracionismo fuerte, conspiracionismo débil by Javier López Alós, Andrés Bernstein Darder, Jon Ureña Salcedo

    Published 2025-01-01
    “…En segundo lugar, nos aproximamos a los elementos más significativos con los que operan de forma explícita o implícita los discursos conspiracionistas (élite, despiertos, dormidos, estructura impersonal), tratando de abordar la particular concepción del poder, las élites o la responsabilidad que se derivan de ellos. …”
    Get full text
    Article