American Magical Ceremonies

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Layered Analysis of Security Ceremonies

A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...

متن کامل

Magical Triangles

Simplicial complexes consist of a set of vertices together with designated subsets. They can be thought of as embedded in Rn with the induced metric and topology, where n is large enough that the points can all be geometrically independent. The sets of points spanned by these designated subsets then form triangles or their higher or lower dimensional analogues according to some restrictions. By...

متن کامل

The Magical Number Seven

My problem is that I have been persecuted by an integer. For seven years this number has followed me around, has intruded in my most private data, and has assaulted me from the pages of our most public journals. This number assumes a variety of disguises, being sometimes a little larger and sometimes a little smaller than usual, but never changing so much as to be unrecognizable. The persistenc...

متن کامل

Magical attachment: Children in magical relations with hospital clowns

The aim of the present study was to achieve a theoretical understanding of several different-age children's experiences of magic relations with hospital clowns in the context of medical care, and to do so using psychological theory and a child perspective. The method used was qualitative and focused on nine children. The results showed that age was important to consider in better understanding ...

متن کامل

Ceremonies for End-to-End Verifiable Elections

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1903

ISSN: 0028-0836,1476-4687

DOI: 10.1038/067392a0