Consolidating our Identity
نویسندگان
چکیده
منابع مشابه
Consolidating Strengths
Editorial Consolidating Strengths I remember receiving a wonderful message from Cambridge University Press around three years ago – an invitation to take over as Editor of Medical History. I accepted almost instantaneously, but remember being nervous about the task at hand. At least as nervous as I had been whilst walking into a cage containing around fifty teenaged lions and lionesses with a g...
متن کاملOur Sense of Identity: “Who am I?” Gender and Cultural Studies
Identity is seen as a cultural and social construct, which indicates how we have been embodied and how we might represent ourselves. The knowledge that identities are the outputs of discourses is a familiar characteristic of some societal concepts. Gender, as an identity or a sense of our identity we build for ourselves, rather than something we are born with, is a constructed cultural category...
متن کاملConsolidating Pipe s
Consolidation is inferring the behavioral description o f a device by composing the behavioral descriptions o f its components . The intent is to infer the behaviora l laws of the device without assuming a scenario (i .e . , initial state and external interactions) . Consolidation differs from qualitative simulation (Bobrow, 1985) i n that qualitative simulation assumes such a scenario (Bylande...
متن کاملConsolidating Masking Schemes
In this paper we investigate relations between several masking schemes. We show that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. The implications of this observation are manifold. We point out a higher-order weakness in higher-order Threshold Implementations, suggest a mitigation and provide new sharings that use a ...
متن کاملConsolidating Inner Product Masking
Masking schemes are a prominent countermeasure to defeat power analysis attacks. One of their core ingredients is the encoding function. Due to its simplicity and comparably low complexity overheads, many masking schemes are based on a Boolean encoding. Yet, several recent works have proposed masking schemes that are based on alternative encoding functions. One such example is the inner product...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Brazilian Journalism Research
سال: 2006
ISSN: 1981-9854,1808-4079
DOI: 10.25200/bjr.v2n2.2006.79