| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910380752103321 |
|
|
Autore |
Crowhurst Michael |
|
|
Titolo |
Arts-Based Pathways into Thinking : Troubling Standardization/s, Enticing Multiplicities, Inhabiting Creative Imaginings / / by Michael Crowhurst, Michael Emslie |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (147 pages) |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Arts-Based Educational Research, , 2524-7514 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Art - Study and teaching |
Critical thinking |
Learning, Psychology of |
Creativity and Arts Education |
Critical Thinking |
Instructional Psychology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Introduction pre-beyond -- Interlude 1: Invitation to come along (to ourselves and readers) -- The Problem: Standardizations and Normativities -- Interlude 2: How are you/we produced in standardized and normative ways? -- Knowing frames analysis: multiple revealing/s of a work of art – to be read aloud -- Interlude 3: Venturing into in-between spaces -- Poetry as productive of persistent multiplicities -- Interlude 4: Mobile phone ranting -- Reading Aloud to support non-normative identifications and affectivities - a triptych -- Interlude 5: Absence - pleasure -- Immersion into a pleasurable flow that affords combinings and diversities -- Interlude 6: Noticing and naming temporal dimensions -- Fabel-ing / Telling Tales-ing / True Story-ing / Creative Writing: A critical/collective/auto/ethnographically informed process aiming to deepen analysis of what is and support imagining what might bes -- Interlude 7: Post–return - cultural contexts that are |
|
|
|
|
|
|
|
|
|
|
|
supportive of diversity -- Conclusion. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book, based on a critical/collective/auto/ethnographic research project, describes an assemblage of theoretically informed, arts-based methods that aim to promote multiplicity and thinking. It explores multiplicities of knowing, sensing, doing and being, generated by analyzing knowing frames, poetry, reading aloud, fableing, playwriting and other inventive, playful and scholarly ways of working with experiences and stories. By offering engaging and inspiring strategies that can disturb standardizations and interrupt cultural normativities, the book sheds light on the conditions that might be present in cultural contexts that enable diversity and creativity. The research project on which this book is based originated from a contradictory set of conditions characterized on the one hand by a marked interest in creative research methods and novel knowledge practices and, on the other hand, by a widespread concern that we live in increasingly standardized times, featuring systems thatspecify objectives ahead of time, demand compliance and narrow the possibilities for human action. The book takes readers on an arts-based journey designed to enhance the opportunities for imaginative and ethical professional practice in education, human services and the arts. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996668470003316 |
|
|
Autore |
Susilo Willy |
|
|
Titolo |
Information Security and Privacy : 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part II / / edited by Willy Susilo, Josef Pieprzyk |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (674 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15659 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer security |
Cryptography |
Data encryption (Computer science) |
Data protection - Law and legislation |
Computer networks - Security measures |
Blockchains (Databases) |
Data and Information Security |
Principles and Models of Security |
Cryptology |
Privacy |
Mobile and Network Security |
Blockchain |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- Post-Quantum Cryptography. -- Towards Quantum Security of Hirose Compression Function and Romulus-H. -- Efficient Multi-instance Vector Commitment and Application to Post quantum Signatures. -- Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium. -- Efficient Revocable Identity-Based Encryption from Middle-Product LWE. -- Code-based Fully Dynamic Accountable Ring Signatures and Group Signatures using the Helper Methodology. -- Partial Key Exposure Attacks on UOV and Its Variants. -- Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWEBased |
|
|
|
|
|
|
|
|
|
|
|
Optimization. -- Fiat-Shamir with Rejection and Rotation. -- Amoeba: More Flexible RLWE-based KEM. -- Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-based Self-Comparison Oracle. -- Homomorphic Encryption and Applications. -- Accountability for Server Misbehavior in Homomorphic Secret Sharing. -- High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping. -- Refined Error Management for Gate Bootstrapping. -- Cryptographic Foundations and Number Theory. -- Compact Lifting for NTT-unfriendly Modulus. -- Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience. -- Solving Generalized Approximate Divisor Multiples Problems. |
|
|
|
|
|
|
Sommario/riassunto |
|
This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security. |
|
|
|
|
|
|
|
| |