03113oam 2200613I 450 991046002000332120200520144314.01-315-41636-01-315-41637-91-61132-984-110.4324/9781315416373 (CKB)3710000000283394(EBL)1863789(SSID)ssj0001368972(PQKBManifestationID)12603307(PQKBTitleCode)TC0001368972(PQKBWorkID)11307106(PQKB)11130816(MiAaPQ)EBC1863789(Au-PeEL)EBL1863789(CaPaEBR)ebr10988331(OCoLC)896701805(OCoLC)956466790(EXLCZ)99371000000028339420180706e20162014 uy 0engur|n|---|||||txtccrTreasures from native California the legacy of Russian exploration /Travis Hudson and Craig D. Bates ; edited by Thomas Blackburn and John R. Johnson ; foreword by Stephen Watrous ; afterword by Glenn FarrisLondon :Routledge,2016.1 online resource (232 p.)First published 2015 by Left Coast Press, Inc.1-61132-982-5 Includes bibliographical references and index.Introduction: the Kunstkamera's California Collection -- Documenting a collection: the collectors and their objects -- A superb collector visits California: Ilia G. Voznesenskii -- Describing a people: the Russians as California ethnographers -- Objects of the quest: hunting and gathering equipment -- Objects of home and hearth: food preparation and shelter -- Interacting with the supernatural: ritual dress -- Objects for festive occasions: music, gifts, and games -- Some comments on significance.The brief Russian presence in California yielded some of the earliest ethnography of Native Californians and some of the best collections of their material culture. Unstudied by western scholars because of their being housed in Russian museums, they are presented here for the first time in an English language volume. Descriptions of early nineteenth-century travelers such as von Wrangel and Voznesenskii are followed by a catalog of objects ranging from hunting weapons to household objects to ritual dress to musical instruments, games, and gift objects. An essential volume for those interestedIndians of North AmericaMaterial cultureCaliforniaCatalogsCaliforniaDiscovery and explorationRussianElectronic books.Indians of North AmericaMaterial culture979.4/01Hudson Travis.945213Bates Craig D945214Blackburn Thomas C224249Johnson John R(John Richard),1949-945215MiAaPQMiAaPQMiAaPQBOOK9910460020003321Treasures from native California2133862UNINA04220nam 22008415 450 991048297900332120251226200151.03-642-04846-310.1007/978-3-642-04846-3(CKB)1000000000798284(SSID)ssj0000315988(PQKBManifestationID)11261558(PQKBTitleCode)TC0000315988(PQKBWorkID)10257019(PQKB)11056610(DE-He213)978-3-642-04846-3(MiAaPQ)EBC3064699(PPN)139959041(EXLCZ)99100000000079828420100301d2009 u| 0engurnn|008mamaatxtccrAdvances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings /edited by Tsuyoshi Takagi, Masahiro Mambo1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XII, 229 p.)Security and Cryptology,2946-1863 ;5824International conference proceedings.3-642-04845-5 Includes bibliographical references and index.Invited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision: Application to APOP Attack -- Impossible Boomerang Attack for Block Cipher Structures -- Improved Distinguishing Attacks on HC-256 -- Cryptographic Protocols -- A Generic Construction of Timed-Release Encryption with Pre-open Capability -- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Universal Designated Verifier Signatures with Threshold-Signers -- Reducing Complexity Assumptions for Oblivious Transfer -- Protection and Intrusion Detection -- Tamper-Tolerant Software: Modeling and Implementation -- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation -- Efficient Intrusion Detection Based on Static Analysis and Stack Walks -- Authentication -- Strongly Secure Authenticated Key Exchange without NAXOS’ Approach -- ID-Based Group Password-Authenticated Key Exchange -- A Proposal of Efficient Remote Biometric Authentication Protocol.This book constitutes the refereed proceedings of the 4th International Workshop on Security, IWSEC 2009, held in Toyama, Japan, in October 2009. The 13 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on block cipher, cryptographic protocols, contents protection and intrusion detection, as well as authentication.Security and Cryptology,2946-1863 ;5824Data protectionComputer networksComputer programmingOperating systems (Computers)Electronic data processingManagementComputers and civilizationData and Information SecurityComputer Communication NetworksProgramming TechniquesOperating SystemsIT OperationsComputers and SocietyData protection.Computer networks.Computer programming.Operating systems (Computers).Electronic data processingManagement.Computers and civilization.Data and Information Security.Computer Communication Networks.Programming Techniques.Operating Systems.IT Operations.Computers and Society.005.8DAT 465fstubSS 4800rvkMambo Masahiro1751564Takagi Tsuyoshi1354919International Workshop on Security.MiAaPQMiAaPQMiAaPQBOOK9910482979003321Advances in Information and Computer Security4186555UNINA