A note on two unpublished Coptic textiles from Belgrade
نویسندگان
چکیده
منابع مشابه
A note on the security of two improved RFID protocols
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
متن کاملAnthracosis in a Coptic mummy.
The laboratory results from the mummy of a 25–35-year-old adult male (“Moses”/Q.445-2012) dating from the Middle Coptic period (AD 4th to 8th century) are reported. This individual was recovered from the Coptic necropolis of Qarara in Middle Egypt during the joint excavation performed by the Eberhard Karls Universität, Tübingen (Germany) and the Egyptian Museum of Barcelona in March 2012. Speci...
متن کاملPulmonary mummification in a Coptic mummy from ancient Egypt.
Mummification of lung tissue is not unusual due to 2 factors: it contains few of the epithelial cells with large concentrations of hydrolase-rich liposomes that are associated with the putrefaction process, and the area of desiccation is very large, due to the large volume of aerated regions.1 However, it is rare to find examples with intact structures. In this paper, we present a mummified ind...
متن کاملComputational Methods for Coptic
This paper motivates and details the first implementation of a freely available part of speech tag set and tagger for Coptic. Coptic is the last phase of the Egyptian language family and a descendant of the hieroglyphs of ancient Egypt. Unlike classical Greek and Latin, few resources for digital and computational work have existed for ancient Egyptian language and literature until now. We evalu...
متن کاملa note on the security of two improved rfid protocols
recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Zograf
سال: 2017
ISSN: 0350-1361,2406-0755
DOI: 10.2298/zog1741019e