5 Hits in 4.8 sec

Disappear here: violence after Generation X

2015 ChoiceReviews  
But for Lila Mae, and her X creator Whitehead (for whom Intuitionism may well be a cipher for Critical Race Theory which, like Critical Legal Studies, feminism, and postcolonial studies, drew on the work  ...  By detaching hacking from computing, Thomas locates, in the "Manifesto," an affirmation of the definition of hacking that Taylor attributes to the computer underground for whom "hacking still refers, in  ...  immense computer-"since first I bedded his" (V 1988, 201) .  ... 
doi:10.5860/choice.194366 fatcat:3lgcnbvj4ng53hhqvrf3lje2ny

Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems RIVER PUBLISHERS SERIES IN COMMUNICATIONS Consulting Series Editors Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems

Marina Ruggieri, Homayoun Nikookar, Ovidiu Vermesan, Peter Friess
This includes the theory and use of systems involving all terminals, computers, and information processors; wired and wireless networks; and network layouts, pro-contentsols, architectures, and implementations  ...  The lightweight security approach presented in [16] is based on the RC4 stream cipher.  ...  State of the Art: There are several lightweight security approaches designed for wireless sensor networks.  ... 

2014 Jahresbericht Annual Report

Registernummer Amtsgericht, Saarbrücken Hrb, Vorsitzender Des Aufsichtsrates, Ing, Jähnichen Stefan, Raimund Geschäftsführung, Seidel, Heike Meißner, Technisch-Administrative Geschäftsführerin, Gesellschafter
Matthias Krause talked on approaches for designing authentication protocols for ultra-light weight devices as for example RFID chips.  ...  To this end cryptographic algorithm designers are invited to submit proposals of authenticated ciphers to CAESAR. All proposals will be made public for evaluation.  ... 

Bitcoin and the Japanese Retail Investor

Maksym Grinenko
These chapters serve as a base for examining the cryptocurrency's role in Japan.  ...  This dissertation begins with the examination of the technical and economical properties of Bitcoin by classifying it as fulfilling two roles: that of a means of payment and that of an investment commodity  ...  Examples of this are ubiquitous.  ... 
doi:10.11588/heidok.00028226 fatcat:4ko5xmczzzgyhbvvmgr664hgfa

Alter-Africas: Science Fiction and the Post-Colonial Black African Novel

Ian P. MacDonald
Kojo Laing, I gauge the impact of African science fiction (sf) on issues of historicity, economics, statism and localized identities and how these have adapted or are adapting to an increasingly globalized  ...  ; rather, it represents a symbolic cipher, a challenge to her contemporary known.  ...  In the end, the "Jesus Tablet" functions as a symbol for the computer and its related technologies.  ... 
doi:10.7916/d8tx3cz1 fatcat:egkppn3r5ndoxe642qkzwfnk4q