01884nam 2200433 450 991046666960332120200120082035.02-335-03096-5(CKB)3790000000023705(EBL)2086912(MiAaPQ)EBC2086912(Au-PeEL)EBL2086912(OCoLC)914148195(EXLCZ)99379000000002370520200120d2015 uy 0freur|n|---|||||txtrdacontentcrdamediacrrdacarrierLa Doctrine SecrèteParties II et III Synthèse de la science de la religion et de la philosophie /Helena Blavatsky[Place of publication not identified] :Ligaran,[2015]©20151 online resource (678 p.)Description based upon print version of record.Section XV - Évolution cyclique et karmaSection XVI - Le zodiaque et son antiquité; Section XVII - Résumé de la situation Extrait :""L'étude de la signification dissimulée sous les légendes religieuses et profanes de n'importe quelle nation, grande ou petite, et, principalement, sous les traditions de l'Orient, a occupé la plus grande partie de la vie de celle qui écrit ces lignes. Elle appartient au groupe de ceux qui sont convaincus qu'aucun récit mythologique, aucun événement traditionnel des légendes populaires n'a jamais été, à aucune époque, une pure fiction..."" TheosophyElectronic books.Theosophy.299.934Blavatsky H. P(Helena Petrovna),1831-1891,907378MiAaPQMiAaPQMiAaPQBOOK9910466669603321La Doctrine Secrète2029822UNINA03766nam 2200493 450 99646443600331620220202212303.03-030-78375-810.1007/978-3-030-78375-4(CKB)4100000011954111(DE-He213)978-3-030-78375-4(MiAaPQ)EBC6640062(Au-PeEL)EBL6640062(OCoLC)1256814214(PPN)257358552(EXLCZ)99410000001195411120220202d2021 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierPart II 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedingsApplied cryptography and network security. /Kazue Sako, Nils Ole Tippenhauer (editors)1st ed. 2021.Cham, Switzerland :Springer,[2021]©20211 online resource (XIV, 512 p. 125 illus., 77 illus. in color.) Security and Cryptology ;127273-030-78374-X Analysis of Applied Systems -- Breaking and Fixing Third-Party Payment Service for Mobile Apps -- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing -- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library -- Secure Computations -- Privacy-Preserving Data Aggregation with Probabilistic Range Validation -- LLVM-based Circuit Compilation for Practical Secure Computation -- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings -- Cryptanalysis -- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements -- Efficient Methods to Search for Best Differential Characteristics on SKINNY -- Towards Efficient LPN-Based Symmetric Encryption -- System Security -- A Differentially Private Hybrid Approach to Traffic Monitoring -- Proactive Detection of Phishing Kit Traffic -- Vestige: Identifying Binary Code Provenance for Vulnerability Detection -- SoK: Auditability and Accountability in Distributed Payment Systems -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms -- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols -- Improved Structured Encryption for SQL Databases via Hybrid Indexing. .The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.Security and Cryptology ;12727Data encryption (Computer science)CongressesData encryption (Computer science)005.82Sako Kazue(Innovation Producer),Tippenhauer Nils OleMiAaPQMiAaPQMiAaPQBOOK996464436003316Applied Cryptography and Network Security771881UNISA02372oam 2200577I 450 991096501860332120251116211212.01-135-64720-80-203-71501-210.4324/9780203715017 (CKB)3710000000115719(OCoLC)882261736(CaPaEBR)ebrary10872902(SSID)ssj0001388215(PQKBManifestationID)11786288(PQKBTitleCode)TC0001388215(PQKBWorkID)11394636(PQKB)11365290(MiAaPQ)EBC3061345(Au-PeEL)EBL3061345(CaPaEBR)ebr10872902(CaONFJC)MIL762307(OCoLC)922959284(OCoLC)889813158(BIP)63427334(BIP)7959974(EXLCZ)99371000000011571920180706e20021958 uy 0engurcnu||||||||txtccrThe sovereign flower on Shakespeare as the poet of royalism, together with related essays and indexes to earlier volumes /[by G. Wilson Knight ; indexes composed by Patricia M. Ball]1st ed.London ;New York :Routledge,2002.1 online resource (315 p.) G. Wilson Knight collected works ;Volume 4"First published 1958 by Methuen & Co. Ltd."--T.p. verso.0-415-29073-2 Includes bibliographical references and indexes.I. This sceptred isle : a study of Shakespeare's kings (1940-1956) -- II. The third eye : an essay on All's well that ends well -- III. What's in a name? -- IV. The Shakespearian integrity (1939) -- V. Some notable fallacies.First published in 2002. This is the final Volume IV of the five G. Wilson Knight collected works series and focuses on Shakespeare as the Poet of Royalism together with related essays and indexes to earlier volumes. The emphasis in this volume is the shift from Shakespeare as the poet of England to Shakespeare as the poet of royalism, in a wide sense.822.33Knight George Wilson1897-,299894FlBoTFGFlBoTFGBOOK9910965018603321The sovereign flower4479561UNINA