| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910478947003321 |
|
|
Autore |
Hartweg Donna L |
|
|
Titolo |
Dorothea Orem [[electronic resource] ] : self-care deficit theory / / Donna L. Hartweg |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Newbury Park, Calif., : SAGE, c1991 |
|
|
|
|
|
|
|
ISBN |
|
1-4833-2584-9 |
1-4522-5323-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (73 p.) |
|
|
|
|
|
|
Collana |
|
Notes on nursing theories ; ; v. 4 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Nursing - Philosophy |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Foreword; Preface; Acknowledgment; Biographical Sketch of a Nurse Theorist; Chapter 1 - Origin and Development; Chapter 2 - Assumptions, Theories, Concepts, and Propositions; Chapter 3 - Application to Practice, Education, and Research; Glossary; References; Bibliography; About the Author |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Encapsulating the work of a classic nursing theorist, this book provides a unique overview of Orem's Self-Care Deficit Model of Nursing. Orem's Model proposes that nursing should be especially concerned with the patient's need to move continuously towards responsible action in self-care in order to sustain life and health or to recover from disease or injury. The actions required of nurses to achieve these goals are clearly described. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996418301403316 |
|
|
Titolo |
Theory of cryptography : 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, proceedings, part III / / Rafael Pass, Krzysztof Pietrzak (Eds.) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2020] |
|
©2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 673 p. 395 illus., 11 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science ; ; 12552 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Universal Composition with Global Subroutines: Capturing Global Setup within plain UC -- Security analysis of SPAKE2+ -- Schrödinger's Pirate: How To Trace a Quantum Decoder -- Quantum Encryption with Certified Deletion -- Secure Quantum Extraction Protocols -- Non-interactive Classical Verification of Quantum Computation -- Classical Verification of Quantum Computations with Efficient Verifier -- Coupling of Random Systems -- Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity -- Zero-Communication Reductions -- Lower Bounds on the Time/Memory Tradeoff of Function Inversion -- Super-Linear Time-Memory Trade-Offs for Symmetric Encryption -- Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions -- On the Security of Time-Lock Puzzles and Timed Commitments -- Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness -- On the Complexity of Arithmetic Secret Sharing -- Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries -- The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs -- Transparent Error Correcting in a Computationally Bounded World -- New Techniques in Replica Encodings with Client Setup. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of |
|
|
|
|
|
|
|
|
|
|
Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually. |
|
|
|
|
|
| |