| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910703207403321 |
|
|
Titolo |
Atmospheric and wake turbulence impacts on wind turbine fatigue loading [[electronic resource] ] : preprint / / S. Lee ... [and others] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Golden, Colo.] : , : National Renewable Energy Laboratory, , [2011] |
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (13 pages) : illustrations (chiefly color) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Soggetti |
|
Wind turbines - Fatigue |
Atmospheric circulation |
Turbulence |
Boundary layer |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed on Feb. 15, 2012). |
"To be presented at the 50th AIAA Aerospace Sciences Meeting, Nashville, Tennessee, January 9-12, 2012." |
"December 2011." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (pages 12-13). |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910782261703321 |
|
|
Autore |
Min Kyung-Jin |
|
|
Titolo |
The Levitical authorship of Ezra-Nehemiah [[electronic resource] /] / Kyung-jin Min |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London ; ; New York, : T & T Clark International, c2004 |
|
|
|
|
|
|
|
ISBN |
|
1-281-80271-9 |
9786611802714 |
0-567-63272-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (192 p.) |
|
|
|
|
|
|
Collana |
|
Journal for the study of the Old Testament. Supplement series ; ; 409 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and indexes. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; Abbreviations; INTRODUCTION; Part I: PRIESTLY OR LEVITICAL AUTHORSHIP?; Chapter 1 EZRA-NEHEMIAH AS AN INDEPENDENT SINGLE WORK; Chapter 2 PRIESTLY OR LEVITICAL AUTHORSHIP?; Summary of Part I; Part II: LITERARY CONTEXT; Chapter 3 LEVITES IN OLD TESTAMENT TEXTS SINCE THE EXILE; Chapter 4 LEVITES IN EZRA-NEHEMIAH; Summary of Part II; Part III: HISTORICAL CONTEXT; Chapter 5 Two CLUES; Chapter 6 LEVITICAL AUTHORSHIP; Summary of Part III; CONCLUSION; Bibliography; Index of References; Index of Authors; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; R; S; T; U; V; W; Y; Z |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The study of Ezra-Nehemiah has been revolutionized in recent years by a growing rejection of the long-established belief that it was composed as part of the Chronicler's work. That shift in scholarly paradigms has re-opened many questions of origin and purpose, and this thesis attempts to establish an answer to the most important of these: the question of authorship. Here, Kyungjin Min argues that Ezra-Nehemiah most likely originated in a Levitical group that received Persian backing during the late-fifth century BCE and that valued the ideologies of decentralization of power, unity and cooper |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910143632903321 |
|
|
Titolo |
Advances in Cryptology – EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14-18, 2000 Proceedings / / edited by Bart Preneel |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2000.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 612 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 1807 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer networks |
Algorithms |
Operating systems (Computers) |
Computer science - Mathematics |
Cryptology |
Computer Communication Networks |
Algorithm Analysis and Problem Complexity |
Operating Systems |
Computational Mathematics and Numerical Analysis |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Factoring and Discrete Logarithm -- Factorization of a 512-Bit RSA Modulus -- An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves -- Analysis and Optimization of the TWINKLE Factoring Device -- Cryptanalysis I: Digital Signatures -- Noisy Polynomial Interpolation and Noisy Chinese Remaindering -- A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme -- Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1 -- Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme -- Invited Talk -- On the Security of 3GPP Networks -- Private Information Retrieval -- One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval -- Single Database Private Information Retrieval Implies Oblivious Transfer -- Key |
|
|
|
|
|
|
|
|
|
|
|
Management Protocols -- Authenticated Key Exchange Secure against Dictionary Attacks -- Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman -- Fair Encryption of RSA Keys -- Threshold Cryptography and Digital Signatures -- Computing Inverses over a Shared Secret Modulus -- Practical Threshold Signatures -- Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures -- Confirmer Signature Schemes Secure against Adaptive Adversaries -- Public-Key Encryption -- Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements -- Using Hash Functions as a Hedge against Chosen Ciphertext Attack -- Quantum Cryptography -- Security Aspects of Practical Quantum Cryptography -- Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation -- Multi-party Computation and Information Theory -- General Secure Multi-party Computation from any Linear Secret-Sharing Scheme -- Minimal-Latency Secure Function Evaluation -- Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free -- Cryptanalysis II: Public-Key Encryption -- New Attacks on PKCS#1 v1.5 Encryption -- A NICE Cryptanalysis -- Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations -- Cryptanalysis of Patarin’s 2-Round Public Key System with S Boxes (2R) -- Invited Talk -- Colossus and the German Lorenz Cipher — Code Breaking in WW II -- Zero-Knowledge -- Efficient Concurrent Zero-Knowledge in the Auxiliary String Model -- Efficient Proofs that a Committed Number Lies in an Interval -- Symmetric Cryptography -- A Composition Theorem for Universal One-Way Hash Functions -- Exposure-Resilient Functions and All-or-Nothing Transforms -- The Sum of PRPs Is a Secure PRF -- Boolean Functions and Hardware -- Construction of Nonlinear Boolean Functions with Important Cryptographic Properties -- Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions -- Cox-Rower Architecture for Fast Parallel Montgomery Multiplication -- Voting Schemes -- Efficient Receipt-Free Voting Based on Homomorphic Encryption -- How to Break a Practical MIX and Design a New One -- Cryptanalysis III: Stream Ciphers and Block Ciphers -- Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 -- Advanced Slide Attacks. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2000, held in Bruges, Belgium, in May 2000. The 39 revised full papers presented were carefully selected from a total of 150 submissions during a highly competitive reviewing process. The book is divided in topical sections of factoring and discrete logarithm, digital signatures, private information retrieval, key management protocols, threshold cryptography, public-key encryption, quantum cryptography, multi-party computation and information theory, zero-knowledge, symmetric cryptography, Boolean functions and hardware, voting schemes, and stream ciphers and block ciphers. |
|
|
|
|
|
|
|
| |