05603nam 2200805Ia 450 991078060260332120230912155617.00-7748-5387-51-280-93936-297866109393679780774809214(CKB)2450000000001298(EBL)3245752(SSID)ssj0000298100(PQKBManifestationID)11239301(PQKBTitleCode)TC0000298100(PQKBWorkID)10343329(PQKB)10730500(SSID)ssj0000280119(PQKBManifestationID)12131521(PQKBTitleCode)TC0000280119(PQKBWorkID)10268392(PQKB)22539970(CaPaEBR)404226(CaBNvSL)jme00327137 (Au-PeEL)EBL3412213(CaPaEBR)ebr10141326(CaONFJC)MIL93936(OCoLC)923443340(DE-B1597)662300(DE-B1597)9780774853873(VaAlCD)20.500.12592/b3d6g1(schport)gibson_crkn/2009-12-01/2/404226(MiAaPQ)EBC3412213(EXLCZ)99245000000000129820050524d2005 uy 0engur|n|---|||||txtccrHaida Gwaii[electronic resource] human history and environment from the time of loon to the time of the iron people /edited by Daryl W. Fedje and Rolf W. MathewesVancouver UBC Pressc20051 online resource (449 p.)Pacific Rim archaeologyIncludes index.0-7748-0922-1 0-7748-0921-3 Includes bibliographical references: p. [376]-401 and index.Intro; Contents; Illustrations; Foreword; Foreword; Preface and Acknowledgments; A Note on Radiocarbon Dating; Part 1: Paleoenvironmental History; Part 2: Haida Traditional History; Part 3: Haida History through Archaeological Research; Conclusion: Synthesis of Environmental and Archaeological Data; References; Notes on Contributors; Index; 1 Late Quaternary Geology of Haida Gwaii and Surrounding Marine Areas; 2 Hecate Strait Paleoshorelines; 3 Terrestrial Paleoecology of Haida Gwaii and the Continental Shelf: Vegetation, Climate, and Plant Resources of the Coastal Migration Route4 Vegetation History of Anthony Island, Haida Gwaii, and Its Relationship to Climate Change and Human Settlement5 The Evolution of Endemic Species in Haida Gwaii; 6 History of the Vertebrate Fauna in Haida Gwaii; 7 Tllsda Xaaydas K'aaygang.nga: Long, Long Ago Haida Ancient Stories; 8 Taadl, Nang Kilslaas, and Haida; 9 Overview of Cultural History; 10 Millennial Tides and Shifting Shores: Archaeology on a Dynamic Landscape; 11 Kilgii Gwaay: An Early Maritime Site in the South of Haida Gwaii12 Test Excavations at Raised Beach Sites in Southern Haida Gwaii and Their Significance to Northwest Coast Archaeology13 Raised Beach Archaeology in Northern Haida Gwaii: Preliminary Results from the Cohoe Creek Site; 14 The Graham Tradition; 15 Gwaii Haanas Settlement Archaeology; 16 Shoreline Settlement Patterns in Gwaii Haanas during the Early and Late Holocene; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; X; Y; ZThe most isolated archipelago on the west coast of the Americas, inhabited for at least 10,500 years, Haida Gwaii has fascinated scientists, social scientists, historians, and inquisitive travellers for decades. This book brings together the results of extensive and varied field research by both federal agencies and independent researchers, and carefully integrates them with earlier archaeological, ethnohistorical, and paleoenvironmental work in the region. It imparts significant new information about the natural history of Haida Gwaii, also known as the Queen Charlotte Islands, and the adjacent areas of Hecate Strait. Chapters analyze new data on ice retreat, shoreline and sea level change, faunal communities, and culture history, providing a more comprehensive picture of the history of the islands from the late glacial through the prehistoric period, to the time of European contact, known to the Haida as the "time of the Iron People." Much of the archaeological work was conducted with the direct participation of members of the Haida Nation. As a complement to the scientific approach of the research, two chapters provide a Haida perspective, explaining the value of traditional oral records and recounting several oral histories, including that of Taadl, the loon, which takes us back to the beginning of time. This volume is a veritable compendium of knowledge, out of which emerges the human and environmental history of Haida Gwaii and its dynamic landscape. Haida Gwaii will be of interest to scholars and students in archaeology and anthropology, and those with an interest in the environmental and cultural history of Haida Gwaii.Pacific Rim archaeology.PaleoecologyBritish ColumbiaHaida GwaiiHaida IndiansHistoryHaida Gwaii (B.C.)AntiquitiesHaida Gwaii (B.C.)HistoryPaleoecologyHaida IndiansHistory.971.1/2Fedje Daryl W1500688Mathewes Rolf W1500689MiAaPQMiAaPQMiAaPQBOOK9910780602603321Haida Gwaii3727485UNINA05281nam 22008775 450 991048337090332120251226200012.03-540-49463-410.1007/11935070(CKB)1000000000283794(SSID)ssj0000317078(PQKBManifestationID)11247710(PQKBTitleCode)TC0000317078(PQKBWorkID)10287015(PQKB)11424913(DE-He213)978-3-540-49463-8(MiAaPQ)EBC3068476(PPN)123139740(BIP)34164502(BIP)13887594(EXLCZ)99100000000028379420100301d2006 u| 0engurnn#008mamaatxtccrCryptology and Network Security 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings /edited by David Pointcheval, Yi Mu, Kefei Chen1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (XIII, 384 p.)Security and Cryptology,2946-1863 ;4301International conference proceedings.3-540-49462-6 Includes bibliographical references and index.Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems -- Efficient Identity-Based Encryption with Tight Security Reduction -- Key Exchange -- A Diffie-Hellman Key Exchange Protocol Without Random Oracles -- Authenticated Group Key Agreement for Multicast -- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks -- Authentication and Signatures -- Efficient Mutual Data Authentication Using Manually Authenticated Strings -- Achieving Multicast Stream Authentication Using MDS Codes -- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps -- Proxy Signatures -- Security Model of Proxy-Multi Signature Schemes -- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque -- Cryptanalysis -- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields -- Improved Collision Attack on Reduced Round Camellia -- Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks -- Implementation -- Bitslice Implementation of AES -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) -- Steganalysis and Watermarking -- Steganalysis Based on Differential Statistics -- Watermarking Essential Data Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing -- Intrusion Detection -- Cooperative Intrusion Detection for Web Applications -- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis -- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems -- A Multi-agent Cooperative Model and System for Integrated Security Monitoring -- Disponibility and Reliability.-Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network -- An Immune-Based Model for Service Survivability -- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks.This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.Security and Cryptology,2946-1863 ;4301CryptographyData encryption (Computer science)Data protectionElectronic data processingManagementComputers and civilizationComputer networksAlgorithmsCryptologyData and Information SecurityIT OperationsComputers and SocietyComputer Communication NetworksAlgorithmsCryptography.Data encryption (Computer science)Data protection.Electronic data processingManagement.Computers and civilization.Computer networks.Algorithms.Cryptology.Data and Information Security.IT Operations.Computers and Society.Computer Communication Networks.Algorithms.005.8Pointcheval David1759592Mu Yi1759813Chen Kefei1959-947887International Conference on Cryptology and Network Security.MiAaPQMiAaPQMiAaPQBOOK9910483370903321Cryptology and network security4202109UNINA