Jane Doe

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Finding Jane Doe: A Forensic Application of 2D Image Calibration

Thirty years ago, a young girl was found decapitated. Her identity remains unknown, and neither her head nor her killer have been found. Until recently, the location of her grave was lost, preventing any efforts to identify her using modern forensic techniques. This paper presents a case study on the use of burial photos to accurately and precisely determine the location of the lost grave. We h...

متن کامل

Concrete Security for Entity Recognition: The Jane Doe Protocol

Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal proof of its concrete security. The protocol neither employs asymmetric cryptography, nor a trusted...

متن کامل

Jane Doe: a cautionary tale for case reports.

Historically, clinical case reports have played an essential role in the professional communication of medical and psychiatric knowledge. Case reports continue to play important roles in the initial identification of new syndromes or unusual variants of established conditions. Case reports and case series also serve to alert clinicians to preliminary evidence of the efficacy of novel treatments...

متن کامل

A review and correction of the errors in Loftus and Guyer on Jane Doe.

There are so many errors among those facts that can be checked in the Loftus and Guyer articles under review that they cast doubt on the accuracy of the alleged facts in these articles that cannot be easily checked. Loftus's and Guyer's two articles, published in a newsstand magazine instead of a peer-reviewed journal, show a pattern of inaccuracy that casts doubt on their claims to have conduc...

متن کامل

Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)

Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. Motivated by an attack against a protocol presented at SAC 2003, the current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal proof of its concrete security. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Interpersonal Violence

سال: 2014

ISSN: 0886-2605,1552-6518

DOI: 10.1177/0886260514534989