LEADER 02377nam 2200361 n 450 001 996385663203316 005 20221108035245.0 035 $a(CKB)1000000000605838 035 $a(EEBO)2240938289 035 $a(UnM)99854702 035 $a(EXLCZ)991000000000605838 100 $a19920731d1628 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 02$aA collection of such sermons and treatises as haue beene written and published by Mr. Samuel Ward, preacher of Ipswich, are here gathered into one volume$b[electronic resource] $eThe titles whereof are in the next page following 210 $aLondon $cPrinted by M[iles] F[lesher and George Miller] for Iohn Grismand, and are to be sold at his shop in Ivie Lane, at the signe of the Gun$d1627 [i.e. 1628] 215 $a[14], 45, [1]; [14], 110, [4]; [10], 126; [10], 86; [10], 85, [1]; [6], 58, 57-72; [8], 55, [1]; [2], 53, [1]; [6], 4 [i.e. 47], [3] p 300 $aA reissue, with added title page and contents leaf, of "All in all" (STC 25033a.5), "The life of faith" (STC 25051.5), "The life of faith in death" (STC 25053.5), "A coale from the altar .. The fift edition" (STC 25042.5), "Balme from Gilead to recouer conscience" (STC 25038 or 25038.5), "Iethro's iustice of peace" (STC 25048.5), "A peace-offring to God for the blessings we enioy vnder his Maiesties reigne" (STC 25054.5), "VVoe to drunkards" (STC 25056.5), and "The happiness of practice" (STC 25045.5). Some copies have STC 25037 for 25038 or 25038.5, and 25054 ([16], 59, [3] p.) for 25054.5. 300 $aFlesher's name from subsidiary title pages. "Balme from Gilead" has imprint: London, printed by G[eorge]. M[iller]. for William Sheffard. 1628. 300 $aThe preliminary blank of "All in all" may appear before the general title page. 300 $aLast p. 47 misnumbered 4. 300 $aReproduction of the original in the British Library. 300 $a"Peace offring" and "Woe to drunkards" transposed. 330 $aeebo-0018 700 $aWard$b Samuel$f1577-1640.$0822737 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996385663203316 996 $aA collection of such sermons and treatises as haue beene written and published by Mr. Samuel Ward, preacher of Ipswich, are here gathered into one volume$92420890 997 $aUNISA LEADER 04201nam 2200397 450 001 9910493746003321 005 20230512070031.0 035 $a(CKB)5590000000537422 035 $a(NjHacI)995590000000537422 035 $a(EXLCZ)995590000000537422 100 $a20230512d2021 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHuman Cultures through the Scientific Lens $eessays in evolutionary cognitive Anthropology /$fPascal Boyer 210 1$aCambridge, UK :$cOpen Book Publishers,$d2021. 215 $a1 online resource (vi, 280 pages) $cillustrations 311 $a1-80064-211-3 320 $aIncludes bibliographical references and index. 327 $aThe Naturalness of (Many) Social Institutions: Evolved Cognition as their Foundation / Pascal Boyer and Michael Bang Petersen -- Why Ritualized Behavior?: Precaution Systems and Action Parsing in Developmental, Pathological and Cultural Rituals / Pascal Boyer and Pierre Lie?nard -- Safety, Threat, and Stress in Intergroup Relations: A Coalitional Index Model / Pascal Boyer, Rengin Firat and Florian van Leeuwen -- Folk-Economic Beliefs: An Evolutionary Cognitive Model / Pascal Boyer and Michael Bang Petersen -- 1. Anthropology, Useful and Scientific: An Introduction / Pascal Boyer -- 2. Institutions and Human Nature / Pascal Boyer -- The Naturalness of (Many) Social Institutions: Evolved Cognition as their Foundation / Pascal Boyer and Michael Bang Petersen -- Why Ritualized Behavior? / Pascal Boyer -- Why Ritualized Behavior?: Precaution Systems and Action Parsing in Developmental, Pathological and Cultural Rituals / Pascal Boyer and Pierre Lie?nard -- 4. Social Groups and Adapted Minds / Pascal Boyer -- Safety, Threat, and Stress in Intergroup Relations: A Coalitional Index Model / Pascal Boyer, Rengin Firat and Florian van Leeuwen -- 5. How People Think about the Economy / Pascal Boyer -- Folk-Economic Beliefs: An Evolutionary Cognitive Model / Pascal Boyer and Michael Bang Petersen -- 6. Detecting Mental Disorder / Pascal Boyer -- Intuitive Expectations and the Detection of Mental Disorder: A Cognitive Background to Folk-Psychiatries / Pascal Boyer -- 7. The Ideal of Integrated Social Science / Pascal Boyer -- Modes of Scholarship in the Study of Culture / Pascal Boyer -- List of Tables and Illustrations. 330 $aThis volume brings together a collection of seven articles previously published by the author, with a new introduction reframing the articles in the context of past and present questions in anthropology, psychology and human evolution. It promotes the perspective of 'integrated' social science, in which social science questions are addressed in a deliberately eclectic manner, combining results and models from evolutionary biology, experimental psychology, economics, anthropology and history. It thus constitutes a welcome contribution to a gradually emerging approach to social science based on E. O. Wilson's concept of 'consilience'. Human Cultures through the Scientific Lens spans a wide range of topics, from an examination of ritual behaviour, integrating neuro-science, ethology and anthropology to explain why humans engage in ritual actions (both cultural and individual), to the motivation of conflicts between groups. As such, the collection gives readers a comprehensive and accessible introduction to the applications of an evolutionary paradigm in the social sciences. This volume will be a useful resource for scholars and students in the social sciences (particularly psychology, anthropology, evolutionary biology and the political sciences), as well as a general readership interested in the social sciences. 517 $aHuman Cultures through the Scientific Lens 606 $aCognition and culture 606 $aEthnopsychology 615 0$aCognition and culture. 615 0$aEthnopsychology. 676 $a306.42 700 $aBoyer$b Pascal$0533977 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910493746003321 996 $aHuman Cultures through the Scientific Lens$93363590 997 $aUNINA LEADER 06700nam 22008895 450 001 9910483910603321 005 20251226202320.0 010 $a1-280-38725-4 010 $a9786613565174 010 $a3-642-13708-3 024 7 $a10.1007/978-3-642-13708-2 035 $a(CKB)2670000000028916 035 $a(SSID)ssj0000446301 035 $a(PQKBManifestationID)11314598 035 $a(PQKBTitleCode)TC0000446301 035 $a(PQKBWorkID)10495780 035 $a(PQKB)10210494 035 $a(DE-He213)978-3-642-13708-2 035 $a(MiAaPQ)EBC3065464 035 $a(PPN)149063970 035 $a(EXLCZ)992670000000028916 100 $a20100625d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security $e8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings /$fedited by Jianying Zhou, Moti Yung 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 564 p. 83 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6123 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-13707-5 320 $aIncludes bibliographical references and index. 327 $aPublic Key Encryption -- On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption -- How to Construct Interval Encryption from Binary Tree Encryption -- Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions -- Digital Signature -- Trapdoor Sanitizable Signatures Made Easy -- Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs -- Redactable Signatures for Tree-Structured Data: Definitions and Constructions -- Block Ciphers and Hash Functions -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail Statistical Saturation Attacks -- Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G??? -- High Performance GHASH Function for Long Messages -- Side-Channel Attacks -- Principles on the Security of AES against First and Second-Order Differential Power Analysis -- Adaptive Chosen-Message Side-Channel Attacks -- Secure Multiplicative Masking of Power Functions -- Zero Knowledge and Multi-party Protocols -- Batch Groth?Sahai -- Efficient and Secure Evaluation of Multivariate Polynomials and Applications -- Efficient Implementation of the Orlandi Protocol -- Improving the Round Complexity of Traitor Tracing Schemes -- Key Management -- Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters -- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead -- Deniable Internet Key Exchange -- Authentication and Identification -- A New Human Identification Protocol and Coppersmith?s Baby-Step Giant-Step Algorithm -- Secure Sketch for Multiple Secrets -- A Message Recognition Protocol Based on Standard Assumptions -- Privacy and Anonymity -- Affiliation-Hiding Key Exchange with Untrusted Group Authorities -- Privacy-Preserving Group Discovery with Linear Complexity -- Two New Efficient PIR-Writing Protocols -- Regulatory Compliant Oblivious RAM -- RFID Security and Privacy -- Revisiting Unpredictability-Based RFID Privacy Models -- OnRFID Privacy with Mutual Authentication and Tag Corruption -- Internet Security -- Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures -- COP: A Step toward Children Online Privacy -- A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. 330 $aACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6123 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aData protection 606 $aComputer Communication Networks 606 $aCryptology 606 $aDiscrete Mathematics in Computer Science 606 $aIT Operations 606 $aAlgorithms 606 $aData and Information Security 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aData protection. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aData and Information Security. 676 $a005.8 701 $aZhou$b Jianying$0846249 701 $aYung$b Moti$01071902 712 12$aACNS 2010 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483910603321 996 $aApplied cryptography and network security$94193594 997 $aUNINA