Showing 1 - 20 results of 39 for search 'secret identity', query time: 0.06s Refine Results
  1. 1
  2. 2

    THE LANGUAGE OF THE “SECRET SENSE”: ON THE LINGUISTIC STUDY OF PROPRIOCEPTION by Alexandra V. Nagornaya

    Published 2024-12-01
    “…Starting from the classical definition of proprioception as a “secret sense” proposed by Ch. Sherrington, the author identifies the factors that impede its cognitive processing, verbalization and scientific analysis. …”
    Get full text
    Article
  3. 3

    Assembly of the salt-secreting mangrove Avicennia rumphiana. by Jeremy R Shearman, Chaiwat Naktang, Chutima Sonthirod, Wasitthee Kongkachana, Sonicha U-Thoomporn, Nukoon Jomchai, Chatree Maknual, Suchart Yamprasai, Poonsri Wanthongchai, Wirulda Pootakham, Sithichoke Tangphatsornruang

    Published 2025-01-01
    “…Avicennia rumphiana, also known as Avicennia marina var. rumphiana or Avicennia lanata, is a mangrove species that has high salt tolerance and is one of the few species that secretes salt through the leaves, similar to Avicennia marina. …”
    Get full text
    Article
  4. 4
  5. 5

    Female Genital Mutilation/Cutting: The Secret World of Women as Seen by Men by Adriana Kaplan, Babucarr Cham, Lamin A. Njie, Ana Seixas, Sandra Blanco, Mireia Utzet

    Published 2013-01-01
    “…Although the practice is generally confined to the secret world of women, it does not mean that men cannot be influential. …”
    Get full text
    Article
  6. 6

    The links between the banned Lithuanian press and the national identity by Vytautas Merkys

    Published 2024-08-01
    “…The publishing was concentrated in Lithuanian Minor (Prussia, Germany) and the USA and secretly disseminated among Lithuanians in the Russian Empire. …”
    Get full text
    Article
  7. 7
  8. 8

    Light Regulates Secreted Metabolite Production and Antagonistic Activity in <i>Trichoderma</i> by Edgardo Ulises Esquivel-Naranjo, Hector Mancilla-Diaz, Rudi Marquez-Mazlin, Hossein Alizadeh, Diwakar Kandula, John Hampton, Artemio Mendoza-Mendoza

    Published 2024-12-01
    “…The 6-PP was purified, and its spectrum by nuclear magnetic resonance and mass spectroscopy was identical to that of commercial 6-PP. Light also induced or suppressed other unidentified metabolites in several other species of <i>Trichoderma</i>. …”
    Get full text
    Article
  9. 9

    Constructing Identities: Amos Tutuola and the Ibadan Literary Elite in the wake of Nigerian Independence by Mackenzie Finley

    Published 2021-12-01
    “…Furthermore, educational experiences and sociocultural identities informed the ways in which independent Nigeria was envisioned by both Tutuola and the elite writers. …”
    Get full text
    Article
  10. 10

    Dynamic assignment and maintenance of positional identity in the ventral neural tube by the morphogen sonic hedgehog. by Eric Dessaud, Vanessa Ribes, Nikolaos Balaskas, Lin Lin Yang, Alessandra Pierani, Anna Kicheva, Bennett G Novitch, James Briscoe, Noriaki Sasai

    Published 2010-06-01
    “…Morphogens are secreted signalling molecules that act in a graded manner to control the pattern of cellular differentiation in developing tissues. …”
    Get full text
    Article
  11. 11
  12. 12

    Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network by Xiujie Zhang, Xingbing Fu, Lu Hong, Yu Liu, Liangliang Wang

    Published 2020-06-01
    “…However, a challenging issue is the well-known identity-based online/offline encryption schemes unable to resist continual key leakage attacks of the secret keys. …”
    Get full text
    Article
  13. 13
  14. 14

    A Function Private Attribute-Based Encryption by Fei Han, Jing Qin

    Published 2014-01-01
    “…It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext. …”
    Get full text
    Article
  15. 15

    Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates by Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso

    Published 2024-01-01
    “…In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. …”
    Get full text
    Article
  16. 16

    Sages comme des images ? Les héroïnes sensationnalistes et le monde de la mode by Laurence Talairach-Vielmas

    Published 2006-12-01
    “…In Mary Elizabeth Braddon’s Lady Audley’s Secret (1861-1862), the detective must learn to read pictures, from a Pre-Raphaelite portrait to books of beauties, so as to unveil the identity of the eponymous heroine, discovering in the process the way consumer society breeds female duplicity.…”
    Get full text
    Article
  17. 17

    A New Data Coding Algorithm for Secure Communication of Image by Hidayet Oğraş

    Published 2024-11-01
    “…It successfully recovers secret images at the receiver’s side using secret code series derived from both the secret and reference images, instead of direct transmission of secret image. …”
    Get full text
    Article
  18. 18

    Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service by Gang Yu, Yongjuan Wang, Zhenfu Cao, Jian Lin, Xiangyu Wang

    Published 2019-04-01
    “…A shared key can be effectively traced, and if the traced identity claims that it is innocent, an auditor can publicly audit who will be responsible for the shared key. …”
    Get full text
    Article
  19. 19

    Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment by Shivangi Shukla, Sankita J. Patel

    Published 2021-05-01
    “…The biometric templates are never identical thereby, this approach allows fuzziness in minutiae points by incorporating Bose–Chaudhuri–Hocquenghem (BCH) codes for error‐correction and secures random codeword of the error‐correcting scheme as secret key by SHA‐256 hash mapping. …”
    Get full text
    Article
  20. 20

    The Fake History: Soviet Totalitarianism and the Memory of the Guerrilla War by Bernardas Gailius

    Published 2008-12-01
    “…There were also criminal cases initiated against Soviet secret agents and collaborators. However, these efforts did not help the tradition to evolve, as they were not accepted by society. …”
    Get full text
    Article