منابع مشابه
Layered Analysis of Security Ceremonies
A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...
متن کاملMagical Triangles
Simplicial complexes consist of a set of vertices together with designated subsets. They can be thought of as embedded in Rn with the induced metric and topology, where n is large enough that the points can all be geometrically independent. The sets of points spanned by these designated subsets then form triangles or their higher or lower dimensional analogues according to some restrictions. By...
متن کاملThe Magical Number Seven
My problem is that I have been persecuted by an integer. For seven years this number has followed me around, has intruded in my most private data, and has assaulted me from the pages of our most public journals. This number assumes a variety of disguises, being sometimes a little larger and sometimes a little smaller than usual, but never changing so much as to be unrecognizable. The persistenc...
متن کاملMagical attachment: Children in magical relations with hospital clowns
The aim of the present study was to achieve a theoretical understanding of several different-age children's experiences of magic relations with hospital clowns in the context of medical care, and to do so using psychological theory and a child perspective. The method used was qualitative and focused on nine children. The results showed that age was important to consider in better understanding ...
متن کاملCeremonies for End-to-End Verifiable Elections
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1903
ISSN: 0028-0836,1476-4687
DOI: 10.1038/067392a0