Search results: Found 3

Listing 1 - 3 of 3
Sort by
From the Renaissance to the Modern World

Author:
ISBN: 9783906980362 9783906980355 Year: Pages: VIII, 128 DOI: 10.3390/books978-3-906980-35-5 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Added to DOAB on : 2014-07-01 11:06:23
License:

Loading...
Export citation

Choose an application

Abstract

On November 11 and 12, 2011, a symposium held at the University of North Carolina in Chapel Hill honored John M. Headley, Emeritus Professor of History. The organizers, Professor MelissaBullard—Headley’s colleague in the department of history at that university—along with ProfessorsPaul Grendler (University of Toronto) and James Weiss (Boston College), as well as Nancy GraySchoonmaker, coordinator of the Program in Medieval and Early Modern Studies—assembled presenters, respondents, and dozens of other participants from Western Europe and North America to celebrate the career of their prolific, versatile, and influential colleague whose publications challenged and often changed the ways scholars think about Martin Luther, Thomas More, the Habsburg empire,early modern Catholicism, globalization, and multiculturalism.This special issue contains the major papers delivered at the symposium, revised to take account of colleagues’ suggestions at the conference and thereafter. John O’Malley studies the censorship ofsacred art with special reference to Michelangelo’s famed “Last Judgment” and the Council of Trent.John Martin sifts Montaigne’s skepticism about contemporaneous strategies for self-disclosure andself-discipline. Stressing the significance of grammar, Constantin Fasolt helps us recapture theRenaissance’s and the early modern religious reformations’ disagreements with antiquity. RonaldWitt’s reappraisal of humanist historiography probes Petrarch’s perspectives on ancient Rome. JohnMcManamon includes tales of theft and market manipulation in his study of the early moderncollection and circulation of books and manuscripts, the commodification of study. To “nuance” John Headley’s conclusions about “the Europeanization of the world,” Jerry Bentley repossesses the influence of other than European societies on several European theorists of human rights. Kate Lowe’s remarks on the reconstruction of race in the Renaissance explores the effects of a critical mistranslation on what being black was taken to mean by Europeans. David Gilmartin introduces readers to the shape of democracy in nineteenth- and twentieth-century India, as well as to the understandings of popular sovereignty that affected elections, suggesting strides that scholars might take “toward a worldwide history of voting”.The remarkable range of these contributions comes close to reflecting the range of ProfessorHeadley’s interests and achievements, which James M. Weiss maps in his tribute, identifying“unifying themes” in Headley’s work.

Open Access and the Library

Authors: ---
ISBN: 9783038977407 Year: Pages: 142 DOI: 10.3390/books978-3-03897-741-4 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Media and communication
Added to DOAB on : 2019-04-05 10:34:31
License:

Loading...
Export citation

Choose an application

Abstract

Libraries are places of learning and knowledge creation. Over the last two decades, digital technology—and the changes that came with it—have accelerated this transformation to a point where evolution starts to become a revolution.The wider Open Science movement, and Open Access in particular, is one of these changes and is already having a profound impact. Under the subscription model, the role of libraries was to buy or license content on behalf of their users and then act as gatekeepers to regulate access on behalf of rights holders. In a world where all research is open, the role of the library is shifting from licensing and disseminating to facilitating and supporting the publishing process itself.This requires a fundamental shift in terms of structures, tasks, and skills. It also changes the idea of a library’s collection. Under the subscription model, contemporary collections largely equal content bought from publishers. Under an open model, the collection is more likely to be the content created by the users of the library (researchers, staff, students, etc.), content that is now curated by the library.Instead of selecting external content, libraries have to understand the content created by their own users and help them to make it publicly available—be it through a local repository, payment of article processing charges, or through advice and guidance. Arguably, this is an overly simplified model that leaves aside special collections and other areas. Even so, it highlights the changes that research libraries are undergoing, changes that are likely to accelerate as a result of initiatives such as Plan S.This Special Issue investigates some of the changes in today’s library services that relate to open access.

Side Channel Attacks

Author:
ISBN: 9783039210008 / 9783039210015 Year: Pages: 258 DOI: 10.3390/books978-3-03921-001-5 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a

Listing 1 - 3 of 3
Sort by
Narrow your search

Publisher

MDPI - Multidisciplinary Digital Publishing Institute (3)


License

CC by-nc-nd (2)

CC by (1)


Language

eng (2)

english (1)


Year
From To Submit

2019 (2)

2013 (1)