منابع مشابه
Finding Jane Doe: A Forensic Application of 2D Image Calibration
Thirty years ago, a young girl was found decapitated. Her identity remains unknown, and neither her head nor her killer have been found. Until recently, the location of her grave was lost, preventing any efforts to identify her using modern forensic techniques. This paper presents a case study on the use of burial photos to accurately and precisely determine the location of the lost grave. We h...
متن کاملConcrete Security for Entity Recognition: The Jane Doe Protocol
Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal proof of its concrete security. The protocol neither employs asymmetric cryptography, nor a trusted...
متن کاملJane Doe: a cautionary tale for case reports.
Historically, clinical case reports have played an essential role in the professional communication of medical and psychiatric knowledge. Case reports continue to play important roles in the initial identification of new syndromes or unusual variants of established conditions. Case reports and case series also serve to alert clinicians to preliminary evidence of the efficacy of novel treatments...
متن کاملA review and correction of the errors in Loftus and Guyer on Jane Doe.
There are so many errors among those facts that can be checked in the Loftus and Guyer articles under review that they cast doubt on the accuracy of the alleged facts in these articles that cannot be easily checked. Loftus's and Guyer's two articles, published in a newsstand magazine instead of a peer-reviewed journal, show a pattern of inaccuracy that casts doubt on their claims to have conduc...
متن کاملConcrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)
Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. Motivated by an attack against a protocol presented at SAC 2003, the current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal proof of its concrete security. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Interpersonal Violence
سال: 2014
ISSN: 0886-2605,1552-6518
DOI: 10.1177/0886260514534989