Showing 41 - 55 results of 55 for search '"Impersonator"', query time: 0.04s Refine Results
  1. 41

    Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography by Lili Wang

    Published 2014-01-01
    “…In this paper, we further analyze Islam and Biswas’ scheme and demonstrate that their scheme cannot resist password compromise impersonation attack. In order to remedy the weaknesses mentioned above, we propose an improved anonymous remote authentication scheme using smart card without using bilinear paring computation. …”
    Get full text
    Article
  2. 42

    Spoofing detection on adaptive authentication System‐A survey by Hind Baaqeel, Sunday Olusanya Olatunji

    Published 2022-03-01
    “…However, their adaptability to changes may be exploited by an attacker to compromise the stored templates, either to impersonate a specific client or to deny access to him/her. …”
    Get full text
    Article
  3. 43

    Scanning the business external environment for information: evidence from Greece by L. Kourteli

    Published 2005-01-01
    “…</b> The results show that perceived uncertainty of the general and task business external environment factors depend on the type of the environment, size of organization, and industry where the organizations operate; organizations adapt their scanning strategy to the complexity of the environment; personal sources of information seem to be more important than impersonal sources; external sources of information are equally important with internal sources; and higher levels of environmental uncertainty are associated with higher levels of scanning the various sources. …”
    Get full text
    Article
  4. 44

    La captura de lo imperceptible. Vida, política y afecto en las ficciones de Alan Pauls by Cecilia Sánchez Idiart

    Published 2018-05-01
    “…Por otro lado, a través de la elaboración de una estética impersonal de la percepción que asume el distanciamiento como premisa clave, estas ficciones imaginan imbricaciones alternativas entre la vida, la política y los cuerpos a partir de la indagación de la politicidad del afecto.…”
    Get full text
    Article
  5. 45

    The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations by Esra Merve Çalışkan

    Published 2024-12-01
    “…Thanks to AI, adversaries can now impersonate humans, manipulate data, eavesdrop on conversations, and exploit system weaknesses on an unprecedented scale. …”
    Get full text
    Article
  6. 46

    University Network Capital as an Element of the City’s Social Capital by R. A. Zayakina

    Published 2021-09-01
    “…Secondly, it expands the city’s social capital through impersonal trust, which convinces society that the university has some universal competence related to the life of the city and its people.…”
    Get full text
    Article
  7. 47

    Consuetudo Legis: Writing Down Customs in the Roman Empire (2nd–5th Century CE) by Soazick Kerneis

    Published 2024-08-01
    “…Of course, it would be presumptuous to transpose our modern categories and to consider laws as impersonal and general rules issued from sovereign powers, and customs as spontaneously generated uses that have been accepted by the social groups concerned. …”
    Get full text
    Article
  8. 48

    DESCARTES ON THE PHENOMENON OF MAN AND THE BOUNDARIES OF DOUBT by A. M. Malivskyi

    Published 2020-12-01
    “…Based on the tendency of anthropologization of Descartes’ basic project, I refute the widespread tendency to qualify Descartes’ position as a sceptic, which is based on superficial stereotypes about the impersonality of his philosophy. The modern reception of the thinker’s texts indicates the priority for him of the task of explicating the conditions of man’s realization of his own vocation in the Universe, which is supplemented by the idea of the limits of science and the doubt correlative to it. …”
    Get full text
    Article
  9. 49

    RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks by Muhammad Tanveer, Saud Alhajaj Aldossari

    Published 2025-01-01
    “…Existing authentication mechanisms (AMs) are often vulnerable to attacks like impersonation and insider threats. This paper introduces a novel lightweight AM, called RAM-MEN that employs cryptography and physically unclonable functions (PUFs) to secure IoT-enabled MEC environments in the 6G era. …”
    Get full text
    Article
  10. 50

    ANTHROPOLOGICAL COMPONENT OF DESCARTES’ ONTOLOGY by Anatolii M. Malivskyi

    Published 2014-06-01
    “…The established tradition of interpretation the Descartes’ philosophizing nature as the filiation process of impersonal knowledge loses its cogency these days. The unprejudiced vision of the texts urges to revise (1) the interpretation of cognition process as reflection, (2) the vision of philosophizing process as the depersonalized one, and (3) reduced human image as a thinking thing as unacceptable.…”
    Get full text
    Article
  11. 51

    Anthropological Component of Descartes’ Ontology by Anatolii M. Malivskyi

    Published 2014-06-01
    “…The established tradition of interpretation the Descartes’ philosophizing nature as the filiation process of impersonal knowledge loses its cogency these days. The unprejudiced vision of the texts urges to revise (1) the interpretation of cognition process as reflection, (2) the vision of philosophizing process as the depersonalized one, and (3) reduced human image as a thinking thing as unacceptable.…”
    Get full text
    Article
  12. 52

    Planning for the Pandemic by Joanne Embree

    Published 2006-01-01
    “…In general, the plans tend to be impersonal because they concentrate on essential functions that need to be undertaken in an institution and assume that, with training, all personnel can cross-cover these services to accommodate for those times when the employees who routinely perform those tasks are absent.…”
    Get full text
    Article
  13. 53

    Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities by Vincent Omollo Nyangaresi, Ahmad A. AlRababah, Ganesh Keshaorao Yenurkar, Ravikumar Chinthaginjala, Muhammad Yasir

    Published 2025-01-01
    “…It is also shown to withstand typical smart city threats such as side‐channeling, offline guessing, session key disclosure, eavesdropping, session hijacking, privileged insider, and impersonation attacks. Moreover, comparative performance shows that it incurs the lowest energy and computation costs at relatively low communication overheads.…”
    Get full text
    Article
  14. 54

    ANTHROPOLOGICAL DIMENSIONS OF PRAGMATISM AND PERSPECTIVES OF SOCIO-HUMANITARIAN REDESCRIPTION OF ANALYTIC METHODOLOGY by A. S. Synytsia

    Published 2019-12-01
    “…Pragmatists criticized impersonal, formal thinking, which cannot be an effective means of cognition. …”
    Get full text
    Article
  15. 55

    Active Theater as a Complementary Therapy for Parkinson's Disease Rehabilitation: A Pilot Study by Nicola Modugno, Sara Iaconelli, Mariagrazia Fiorlli, Francesco Lena, Imogen Kusch, Giovanni Mirabella

    Published 2010-01-01
    “…We hypothesized that theater could reduce clinical disability and improve the quality of life of PD patients (primary end points) more efficiently than other complementary therapies because (1) in order to impersonate a character, patients are forced to regain the control of their bodies; and (2) while being part of a group, patients have a high degree of social interaction. …”
    Get full text
    Article