992 resultados para Forgery of antiquities.
Resumo:
This study explores the mortuary remains of children from the MH-LH I periods of the Argolid, Greece. This examination concentrates on how the child in death acted as a tool for wealth and status display. Here, children are understood to have perpetuated, maintained, and reinforced status distinctions between families in their community. The analysis of one hundred child burials that date to these periods illustrates how the burials of children were important opportunities used by the families of children to display wealth and status. Thus, children can be viewed as important factors in the reorganization of social structure in the transition from the Middle to Late Helladic.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method.
Resumo:
The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further anallyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.
Resumo:
The Portable Antiquities Scheme (PAS) database includes records of over 225,000 artefacts of Roman date, with a wide geographical coverage and the potential to contribute to our understanding of Romano-British landscapes and settlement at several scales of analysis. This paper draws upon the author’s doctoral research to describe regional case studies from six counties (Wiltshire, Worcestershire, Warwickshire, Northamptonshire, North Lincolnshire and Cumbria) on the use of PAS data. The data have value nationally and regionally as general guides to ancient settlement patterns, but it is arguably at the micro-scale that they have the most potential. With reference to detailed landscape studies from parts of Warwickshire and Wiltshire, the paper argues that sites represented by PAS data are often rural settlements that show evidence for continued activity throughout the Roman period. The paper demonstrates that with an appropriate methodology PAS data can be an immensely valuable archaeological resource, particularly when interpreted at multiple scales, and can be considerably more than a guide to broad distributions of Roman finds.
Resumo:
Amazonian oils and fats display unique triacylglycerol (TAG) profiles and, because of their economic importance as renewable raw materials and use by the cosmetic and food industries, are often subject to adulteration and forgery. Representative samples of these oils (andiroba, Brazil nut, buriti, and passion fruit) and fats (cupuacu, murumuru, and ucuba) were characterized without pre-separation or derivatization via dry (solvent-free) matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS). Characteristic profiles of TAG were obtained for each oil and tat. Dry MALDI-TOF MS provides typification and direct and detailed information, via TAG profiles, of their variable combinations of fatty acids. A database from spectra could be developed and may be used for their fast and reliable typification, application screening, and quality control.
Resumo:
William Gaddis’s The Recognitions (1955) is a selfreflexive novel that portrays Wyatt Gwyon’s trajectory from childhood to maturity, as he rejects and searches for originality. The present work bestows an analysis of William Gaddis’s The Recognitions focusing on the problematization of originality and authorship proposed by the novel by means of the central issues of forgery and plagiarism, which bring with them two larger and more important sister-notions: authorship and originality. The novel questions the prevailing demand for originality and discusses the possibility of being original. It formulates an aesthetics of recognitions defended in the novel and used by the author in the making of this text. In order to do that, this work provides a view on the different concepts associated with the terms originality and original, as well as some of the main infringements related to them in contemporary society. It also offers an account of the development of the concepts of originality and authorship in Western society, showing the growing importance of the figure of the author and the parallel development of the concepts of plagiarism and copyright. The next three chapters are dedicated to attempt to provide an account of William Gaddis’s The Recognitions focusing on the main artist characters and an analysis of the novel in the light of the theoretical and historical background provided. The first of these chapters focuses on Wyatt’s trajectory and his visions of art. The second identifies and analyses Wyatt’s mirrors in the narrative, which reinforce the self-reflective structure of the novel. And the third chapter exemplifies and analyses Wyatt’s aesthetics of recognitions, which turns out to be Gaddis’s own aesthetics in the making of his fiction.
Resumo:
v.36:no.1(1945)
Resumo:
v.72(1979)
Resumo:
v.68:no.2(1968)