LEADER 06725nam 22008535 450 001 996466142303316 005 20231025235328.0 010 $a3-540-47823-X 024 7 $a10.1007/11909033 035 $a(CKB)1000000000283765 035 $a(SSID)ssj0000316709 035 $a(PQKBManifestationID)11273181 035 $a(PQKBTitleCode)TC0000316709 035 $a(PQKBWorkID)10275483 035 $a(PQKB)10126267 035 $a(DE-He213)978-3-540-47823-2 035 $a(MiAaPQ)EBC3068531 035 $a(PPN)123139325 035 $a(EXLCZ)991000000000283765 100 $a20100924d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCommunications and Multimedia Security$b[electronic resource] $e10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings /$fedited by Herbert Leitold, Evangelos Markatos 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 260 p.) 225 1 $aSecurity and Cryptology ;$v4237 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-47820-5 320 $aIncludes bibliographical references and index. 327 $aComputing of Trust in Ad-Hoc Networks -- TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation -- On the Privacy Risks of Publishing Anonymized IP Network Traces -- Secure Mobile Notifications of Civilians in Case of a Disaster -- A Fair Anonymous Submission and Review System -- Attribute Delegation Based on Ontologies and Context Information -- Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains -- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange -- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart -- Perturbing and Protecting a Traceable Block Cipher -- A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors -- Timed Release Cryptography from Bilinear Pairings Using Hash Chains -- Compression of Encrypted Visual Data -- Selective Encryption for Hierarchical MPEG -- Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods -- A Flexible and Open DRM Framework -- PPINA ? A Forensic Investigation Protocol for Privacy Enhancing Technologies -- A Privacy Agent in Context-Aware Ubiquitous Computing Environments -- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems -- Attack Graph Based Evaluation of Network Security -- Information Modeling for Automated Risk Analysis -- Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. 330 $aDuringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious traffic, we see more and more people losing their confidence in information technologies as they get significantly concerned about their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world have designed and are currently implementing systematic approaches to network and information security, most of which are underlined by the same principle: there is much more room for improvement and research. Along the lines of encouraging and catalyzing research in the area of communications and multimedia security, it is our great pleasure to present the proceedings of the 10th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security(CMS2006),which was held in Heraklion, Crete on October 19-21, 2006. Continuing the tradition of previous CMS conferences, we sought a balanced program containing presentations on various aspects of secure communication and multimedia systems. Special emphasis was laid on papers with direct practical relevance for the construction of secure communication systems. The selection of the program was a challenging task. In total, we received 76 submissions, from which 22 were selected for presentation as full papers. 410 0$aSecurity and Cryptology ;$v4237 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aElectrical engineering 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 610 1 $aCMS 610 1 $aMultimedia security 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 0$aElectrical engineering. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCommunications Engineering, Networks. 676 $a005.8 702 $aLeitold$b Herbert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMarkatos$b Evangelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aInternational Federation for Information Processing.$bTechnical Committee 6. 712 02$aInternational Federation for Information Processing.$bTechnical Committee 11--Computer Security. 712 12$aIFIP TC6/TC11 International Conference on Communications and Multimedia Security 906 $aBOOK 912 $a996466142303316 996 $aCommunications and Multimedia Security$9772291 997 $aUNISA LEADER 04309nam 2200793 450 001 9910788821303321 005 20210422210928.0 010 $a1-5015-0078-3 010 $a1-61451-123-3 024 7 $a10.1515/9781614511236 035 $a(CKB)3360000000514931 035 $a(EBL)1377146 035 $a(SSID)ssj0001420885 035 $a(PQKBManifestationID)11852552 035 $a(PQKBTitleCode)TC0001420885 035 $a(PQKBWorkID)11408191 035 $a(PQKB)11093133 035 $a(DE-B1597)175865 035 $a(OCoLC)951149681 035 $a(OCoLC)973399877 035 $a(DE-B1597)9781614511236 035 $a(Au-PeEL)EBL1377146 035 $a(CaPaEBR)ebr11006254 035 $a(CaONFJC)MIL805822 035 $a(OCoLC)904079357 035 $a(CaSebORM)9781501500787 035 $a(MiAaPQ)EBC1377146 035 $a(EXLCZ)993360000000514931 100 $a20150127h20142014 uy| 0 101 0 $aeng 135 $aur|nu---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aBlending spaces $emediating and assessing intercultural competence in the L2 classroom /$fArnd Witte 210 1$aBoston :$cDe Gruyter Mouton,$d[2014] 210 4$dİ2014 215 $a1 online resource (456 p.) 225 1 $aTrends in applied linguistics,$x1868-6362 ;$vvolume 8 300 $aDescription based upon print version of record. 311 0 $a1-61451-153-5 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tContents --$t1 Introduction: The interplay of languages, cultures, and minds --$t2 First language acquisition and early cognitive development --$t3 Formation of concepts and plausibility structures --$t4 Language and the intersubjective construction of meaning --$t5 Imposing structure on language-in-use: From language philosophy to discourse analysis --$t6 The dynamics of identity --$t7 The complexities of culture --$t8 The interplay of cultures: Constructs of interculture --$t9 Fostering intercultural competence in the second language classroom --$t10 Mediating and assessing intercultural competence in the L2 classroom --$t11 Conclusion --$tReferences --$tName index --$tSubject index 330 $aThis book comprehensively analyzes the development of interculturally blended third spaces by the second language learner, beginning with the linguistic and sociocultural imprints of the first language and culture on the mind and culminating in the proposal of a phase-model of the development of intercultural competence. The foundational analysis of L1-mediated constructs is followed by an analysis of forms interaction, concepts of identity and constructs of culture/interculture, thus shifting the object of analysis from the subjective to the intersubjective levels of construction and interaction. The focus of the book is on the gradual development of interculturally blended third spaces in the mind of the learner as genuinely new bases for construction. This book takes an interdisciplinary approach, drawing on research in cultural psychology, linguistic anthropology, critical theory, language acquisition and second language learning and shows how culture and interculture need to be emphasized as an integral part of second language learning. 410 0$aTrends in applied linguistics ;$v8. 606 $aSecond language acquisition 606 $aIntercultural communication$xStudy and teaching 606 $aMulticultural education$xStudy and teaching 606 $aCommunicative competence$xTesting 606 $aLanguage and culture$xStudy and teaching 610 $aApplied Linguistics. 610 $aIntercultural Competence. 610 $aLanguage and Culture. 610 $aSecond Language Learning. 610 $aThird Space. 615 0$aSecond language acquisition. 615 0$aIntercultural communication$xStudy and teaching. 615 0$aMulticultural education$xStudy and teaching. 615 0$aCommunicative competence$xTesting. 615 0$aLanguage and culture$xStudy and teaching. 676 $a418.0071 700 $aWitte$b Arnd$01524226 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910788821303321 996 $aBlending spaces$93764875 997 $aUNINA