منابع مشابه
Nadja Maglica : ” Colourful Baranja ” : Traditional Clothes of Croats from Baranja
T bilingual monograph dealing with clothes worn by the Croatian peasant population in the region of Baranja is a book of wide ranging content and sumptuous graphic design (by Studio Rašić, Zagreb; translated by Jasna Bilinić-Zubak). In addition, it is a book of peculiar destiny. When its author started working on the theme in 1991, little did she know about the events soon to befall the furthes...
متن کاملLayered Analysis of Security Ceremonies
A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...
متن کاملSound-aligned corpus of Udmurt dialectal texts
The paper describes an ongoing effort aiming at building a sound-aligned corpus of Udmurt spoken texts. The corpus currently consists of about 3.5 hours of recordings, collected during fieldwork trips between 2014 and 2016. The recordings represent three dialect groups of Udmurt (Northern, Central and Southern). The recordings were transcribed with the help of native speakers. All morphological...
متن کاملCeremonies for End-to-End Verifiable Elections
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...
متن کاملProbabilistic Modelling of Humans in Security Ceremonies
We are interested in formal modelling and verification of security ceremonies. Considerable efforts have been put into verifying security protocols, with quite successful tools currently being widely used. The relatively recent concept of security ceremonies, introduced by Carl Ellison, increases the complexity of protocol analysis in several directions: a ceremony should include all relevant o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Yearbook of Finno-Ugric Studies
سال: 2020
ISSN: 2311-0333,2224-9443
DOI: 10.35634/2224-9443-2020-14-1-131-137