04231nam 2200769 450 991045008230332120211005203947.00-19-756197-71-280-50261-40-19-530353-90-19-803569-11-4337-0114-6(CKB)1000000000029122(EBL)279847(OCoLC)171560455(SSID)ssj0000246639(PQKBManifestationID)11216052(PQKBTitleCode)TC0000246639(PQKBWorkID)10189641(PQKB)11446153(MiAaPQ)EBC279847(MiAaPQ)EBC4703024(StDuBDS)EDZ0002341413(Au-PeEL)EBL4703024(CaPaEBR)ebr11273771(OCoLC)59006983(MiAaPQ)EBC5797708(EXLCZ)99100000000002912220161012h20042004 uy 0engur|n|---|||||txtccrThe skull of Australopithecus afarensis /William H. Kimbel, Yoel Rak, Donald C. Johnson ; with a contribution on the brain endocast by Ralph L. Holloway and Michael S. YuanOxford, [England] :Oxford University Press,2004.©20041 online resource (273 p.)Human Evolution SeriesPreviously issued in print: 2004.0-19-515706-0 Includes bibliographical references and index.Contents; 1 Background; 2 Recovery and Reconstruction of A.L. 444-2; Recovery; Stratigraphic Provenance and Geological Age; Taphonomic Aspects and Reconstruction of the Skull; Ontogenetic Age and Sex of A.L. 444-2; 3 A.L. 444-2: The Skull as a Whole; The Cranium with the Occluded Mandible; The Cranium: Lateral and Median Views; The Cranium: Vertical View; The Cranium: Frontal View; The Cranium: Occipital View; The Cranium: Basal View; "Composite Reconstruction" of 1984/1988 in Light of A.L. 444-2; Pattern of Cranial Cresting; Pattern of the Venous Sinuses4 Endocranial Morphology of A.L. 444-2Distortion of the Endocast; Assessment of Endocranial Volume; Morphological Description; Discussion; 5 Elements of the Disarticulated Skull; The Frontal Bone; The Parietal Bones; The Temporal Bones; The Occipital Bone; The Maxilla and the Palatine Bone; The Nasal Bones; The Zygomatic Bone; The Mandible; Dentition; 6 Implications of A.L. 444-2 for the Taxonomic and Phylogenetic Status; Morphology of the A.L. 444-2 Skull: Summary of the Major Features; Taxonomic and Phylogenetic Status; Phylogenetic Position; Australopithecus afarensis in Human EvolutionNotesReferences; Index; A; B; C; D; E; F; G; H; I; K; L; M; N; O; P; R; S; T; V; W; ZThis is an in-depth account of the fossil skull anatomy and evolutionary significance of the 3.6-3.0 million year old early human species Australopithecus afarensis. Knowledge of this species is pivotal to understanding early human evolution, because 1) the sample of fossil remains of A. afarensis is among the most extensive for any early human species, and the majority of remains are of taxonomically informative skulls and teeth; 2) the wealth of material makes A. afarensis an indispensable point of reference for the interpretation of other fossil discoveries; 3) the species occupies a time period that is the focus of current research to determine when, where, and why the human lineage first diversified into separate contemporaneous lines of descent.Human evolution series.Australopithecus afarensisSkullCraniologyElectronic books.Australopithecus afarensis.Skull.Craniology.599.9/48Kimbel William H.1028663Rak YoelJohanson Donald C.Holloway Ralph L.Yuan Michael S.MiAaPQMiAaPQMiAaPQBOOK9910450082303321The skull of Australopithecus afarensis2444738UNINA04917nam 22007215 450 99646573100331620200702041002.010.1007/11586821(CKB)1000000000213526(SSID)ssj0000317073(PQKBManifestationID)11274465(PQKBTitleCode)TC0000317073(PQKBWorkID)10287785(PQKB)10254162(DE-He213)978-3-540-32418-8(MiAaPQ)EBC3067771(PPN)123098572(EXLCZ)99100000000021352620100412d2005 u| 0engurnn|008mamaatxtccrCryptography and Coding[electronic resource] 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings /edited by Nigel Smart1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XII, 468 p.) Security and Cryptology ;3796Bibliographic Level Mode of Issuance: MonographPrinted edition: 9783540302766 Includes bibliographical references and index.Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploiting Coding Theory for Collision Attacks on SHA-1 -- Signatures and Signcryption -- Hash Based Digital Signature Schemes -- A General Construction for Simultaneous Signing and Encrypting -- Non-interactive Designated Verifier Proofs and Undeniable Signatures -- Symmetric Cryptography -- Partial Key Recovery Attacks on XCBC, TMAC and OMAC -- Domain Expansion of MACs: Alternative Uses of the FIL-MAC -- Normality of Vectorial Functions -- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 -- Side Channels -- The Physically Observable Security of Signature Schemes -- On the Automatic Construction of Indistinguishable Operations -- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods -- Algebraic Cryptanalysis -- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem -- An Algebraic Framework for Cipher Embeddings -- Probabilistic Algebraic Attacks -- Information Theoretic Applications -- Unconditionally Secure Information Authentication in Presence of Erasures -- Generalized Strong Extractors and Deterministic Privacy Amplification -- On Threshold Self-healing Key Distribution Schemes -- Number Theoretic Foundations -- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator -- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited -- Pairings on Elliptic Curves over Finite Commutative Rings -- Public Key and ID-Based Encryption Schemes -- A Key Encapsulation Mechanism for NTRU -- Efficient Identity-Based Key Encapsulation to Multiple Parties -- Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme.Security and Cryptology ;3796Data encryption (Computer science)ComputersCoding theoryInformation theoryComputer science—MathematicsComputer communication systemsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Data encryption (Computer science).Computers.Coding theory.Information theory.Computer science—Mathematics.Computer communication systems.Cryptology.Theory of Computation.Coding and Information Theory.Discrete Mathematics in Computer Science.Computer Communication Networks.005.82Smart Nigeledthttp://id.loc.gov/vocabulary/relators/edtIMA International ConferenceBOOK996465731003316Cryptography and Coding772174UNISA