Works matching DE "IMPERSONATION"
Results: 304
More Playful than Anxious: Cross-dressing, Sex-impersonation and the Colonial Stage.
- Published in:
- 2008
- By:
- Publication type:
- Literary Criticism
ČAPAKOBA, THE MAYO EASTER CEREMONIAL IMPERSONATOR: EXPLANATIONS OF RITUAL CLOWNING.
- Published in:
- Journal for the Scientific Study of Religion, 1969, v. 8, n. 1, p. 1, doi. 10.2307/1385250
- By:
- Publication type:
- Article
'Just a man singing': Scott Walker and the voice of another.
- Published in:
- Journal for Cultural Research, 2020, v. 24, n. 3, p. 236, doi. 10.1080/14797585.2020.1806439
- By:
- Publication type:
- Article
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 6, p. 8434, doi. 10.1007/s11227-023-05749-4
- By:
- Publication type:
- Article
A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 11, p. 12523, doi. 10.1007/s11227-023-05089-3
- By:
- Publication type:
- Article
An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 8070, doi. 10.1007/s11227-022-04978-3
- By:
- Publication type:
- Article
An efficient mutual authentication scheme for IoT systems.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 14, p. 16056, doi. 10.1007/s11227-022-04520-5
- By:
- Publication type:
- Article
A provably secure lightweight authentication protocol in mobile edge computing environments.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 12, p. 13893, doi. 10.1007/s11227-022-04411-9
- By:
- Publication type:
- Article
Energy‐efficient multi‐biometric system for Internet of Things using trust management.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2021, v. 10, n. 6, p. 625, doi. 10.1049/bme2.12028
- By:
- Publication type:
- Article
Voice disguise by mimicry: deriving statistical articulometric evidence to evaluate claimed impersonation.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2017, v. 6, n. 4, p. 282, doi. 10.1049/iet-bmt.2016.0126
- By:
- Publication type:
- Article
Fora do armário, dentro do closet: o camarim como espaço de transformação.
- Published in:
- Cadernos PAGU, 2005, n. 24, p. 227, doi. 10.1590/S0104-83332005000100011
- By:
- Publication type:
- Article
Registration and Impersonation in A Tale of Two Cities.
- Published in:
- SEL: Studies in English Literature (Johns Hopkins), 2021, v. 61, n. 4, p. 641, doi. 10.1353/sel.2021.a910833
- By:
- Publication type:
- Article
The Jew of Malta and the Diabolic Power of Theatrics in the 1580s.
- Published in:
- SEL: Studies in English Literature (Johns Hopkins), 2006, v. 46, n. 2, p. 257, doi. 10.1353/sel.2006.0016
- By:
- Publication type:
- Article
Dramatic Images of Kingship in Heywood and Bale.
- Published in:
- SEL: Studies in English Literature (Johns Hopkins), 1999, v. 39, n. 2, p. 239, doi. 10.2307/1556164
- By:
- Publication type:
- Article
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol.
- Published in:
- Information Technology & Control, 2019, v. 48, n. 2, p. 211, doi. 10.5755/j01.itc.48.2.17417
- By:
- Publication type:
- Article
JUST LIKE THE REAL THING: In the POW camps of the Second World War, soldiers found release - from the conditions and from the all-male company - in female impersonation.
- Published in:
- History Today, 2017, v. 67, n. 12, p. 44
- By:
- Publication type:
- Article
The perception of the cyberbullying phenomenon among Estonian students: Comparison of boys and girls on the basis of cyberbullying criteria and types of behaviour.
- Published in:
- Estonian Journal of Education / Eesti Haridusteaduste Ajakiri, 2015, v. 3, n. 2, p. 211, doi. 10.12697/eha.2015.3.2.07
- By:
- Publication type:
- Article
The Ancient Rhetorical Suasoria Versus the Modern Technical Case.
- Published in:
- Rhetoric Review, 1988, v. 7, n. 1, p. 113, doi. 10.1080/07350198809388843
- By:
- Publication type:
- Article
Performance and the politics of gender: transgender performance in contemporary Chinese films.
- Published in:
- Gender, Place & Culture: A Journal of Feminist Geography, 2014, v. 21, n. 5, p. 622, doi. 10.1080/0966369X.2013.810595
- By:
- Publication type:
- Article
The Face of Imposture in Postrevolutionary France.
- Published in:
- French Historical Studies, 2012, v. 35, n. 2, p. 291, doi. 10.1215/00161071-1498481
- By:
- Publication type:
- Article
Female impersonation and gender ambivalence: Does drag challenge gender norms?
- Published in:
- Image & Text, 2021, n. 35, p. 1, doi. 10.17159/2617-3255/2021/n35a4
- By:
- Publication type:
- Article
THE WESTMINSTER IMPOSTORS: IMOPERSONATING LAW ENFORCEMENT IN EARLY EIGTEENTH-CENTURY LONDON.
- Published in:
- Eighteenth-Century Studies, 2005, v. 38, n. 3, p. 461, doi. 10.1353/ecs.2005.0026
- By:
- Publication type:
- Article
Racial impersonation: Others in Finnish visual culture.
- Published in:
- Journal of Scandinavian Cinema, 2023, v. 13, n. 2, p. 119, doi. 10.1386/jsca_00091_1
- By:
- Publication type:
- Article
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies.
- Published in:
- Computers, Materials & Continua, 2024, v. 80, n. 1, p. 263, doi. 10.32604/cmc.2024.052405
- By:
- Publication type:
- Article
A Federated Learning Framework with Blockchain-Based Auditable Participant Selection.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 3, p. 5125, doi. 10.32604/cmc.2024.052846
- By:
- Publication type:
- Article
An Efficient Impersonation Attack Detection Method in Fog Computing.
- Published in:
- Computers, Materials & Continua, 2021, v. 68, n. 1, p. 267, doi. 10.32604/cmc.2021.016260
- By:
- Publication type:
- Article
'I'm Crushing Your Binaries!' Drag in Monty Python and Kids in the Hall.
- Published in:
- Comedy Studies, 2016, v. 7, n. 2, p. 169, doi. 10.1080/2040610X.2016.1197664
- By:
- Publication type:
- Article
A LIGHTWEIGHT SYMMETRIC CRYPTOGRAPHY BASED USER AUTHENTICATION PROTOCOL FOR IOT BASED APPLICATIONS.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 3, p. 1647, doi. 10.12694/scpe.v25i3.2692
- By:
- Publication type:
- Article
RFID Tag Ownership Transfer Protocol using Blockchain.
- Published in:
- International Journal of Performability Engineering, 2019, v. 15, n. 9, p. 2544, doi. 10.23940/ijpe.19.09.p28.25442552
- By:
- Publication type:
- Article
Eleventh-Century Drag Acts? Three Old English Poems at Exeter Cathedral.
- Published in:
- Exemplaria, 2020, v. 32, n. 4, p. 346, doi. 10.1080/10412573.2020.1846348
- By:
- Publication type:
- Article
PROHIBITION OF JIATOU ZAJU IN THE MING DYNASTY AND THE PORTRAYAL OF THE EMPEROR ON STAGE.
- Published in:
- Ming Studies, 2004, n. 49, p. 82, doi. 10.1179/014703704788762826
- By:
- Publication type:
- Article
Adequate Rules for Depositor Protection Urged.
- Published in:
- Economy, Culture & History Japan Spotlight Bimonthly, 2005, v. 24, n. 3, p. 4
- Publication type:
- Article
'TO MAKE A NEW KING': Seasonal Drama and Local Politics in Norwich, 1443.
- Published in:
- Medieval English Theatre, 1995, v. 17, p. 29
- By:
- Publication type:
- Article
Blackface Cuba, 1840-1895.
- Published in:
- 2006
- By:
- Publication type:
- Book Review
Ethnic Drag: Performance Race, Nation, Sexuality in West Germany (Book).
- Published in:
- 2004
- By:
- Publication type:
- Book Review
TRYING TO "POS THE IMPOSSIBLE.".
- Published in:
- 1948
- By:
- Publication type:
- Editorial
HEADSTONE STORIES: RAISING THE DEAD AT THE INDIANOLA CITY CEMETERY.
- Published in:
- Mississippi Libraries, 2016, v. 79, n. 1, p. 25
- Publication type:
- Article
Headstone Stories: Raising the Dead at the Indianola City Cemetery.
- Published in:
- Mississippi Libraries, 2012, v. 75, n. 1, p. 31
- By:
- Publication type:
- Article
Derogation without words: On the power of non-verbal pejoratives.
- Published in:
- Philosophical Psychology, 2017, v. 30, n. 6, p. 784, doi. 10.1080/09515089.2017.1315765
- By:
- Publication type:
- Article
Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table.
- Published in:
- Nonlinear Dynamics, 2019, v. 95, n. 4, p. 3177, doi. 10.1007/s11071-018-04748-y
- By:
- Publication type:
- Article
Design a Strong Scheme to Resist Phishing Attack.
- Published in:
- Journal of Basrah Researches (Sciences), 2021, v. 47, n. 1, p. 171
- By:
- Publication type:
- Article
Police Impersonation: Pretenses and Predators.
- Published in:
- American Journal of Criminal Justice, 2012, v. 37, n. 4, p. 505, doi. 10.1007/s12103-011-9153-z
- By:
- Publication type:
- Article
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication.
- Published in:
- International Journal of Information Security, 2025, v. 24, n. 1, p. 1, doi. 10.1007/s10207-024-00931-y
- By:
- Publication type:
- Article
FOTB: a secure blockchain-based firmware update framework for IoT environment.
- Published in:
- International Journal of Information Security, 2020, v. 19, n. 3, p. 257, doi. 10.1007/s10207-019-00467-6
- By:
- Publication type:
- Article
Semiquantum secure direct communication with authentication based on single-photons.
- Published in:
- International Journal of Quantum Information, 2019, v. 17, n. 3, p. N.PAG, doi. 10.1142/S0219749919500242
- By:
- Publication type:
- Article
PLAY AND IMPERSONATION: FINDING THE RIGHT INTERSUBJECT1VE RHYTHM.
- Published in:
- Clinical Social Work Journal, 2003, v. 31, n. 4, p. 371, doi. 10.1023/A:1026052109960
- By:
- Publication type:
- Article
All shook up.
- Published in:
- China Business Review, 1996, v. 23, n. 1, p. 63
- By:
- Publication type:
- Article
Detecting impersonation episode using teaching learning‐based optimization and support vector machine techniques.
- Published in:
- Expert Systems, 2023, v. 40, n. 7, p. 1, doi. 10.1111/exsy.13290
- By:
- Publication type:
- Article
Asian Mutations: Yellowface from More Light to the Royal Shakespeare Company’s The Orphan of Zhao.
- Published in:
- Contemporary Theatre Review, 2014, v. 24, n. 4, p. 452, doi. 10.1080/10486801.2014.946924
- By:
- Publication type:
- Article
Cross-Dressing and Theatre for Liberation: Women in Lesotho.
- Published in:
- Contemporary Theatre Review, 2002, v. 12, n. 1/2, p. 193, doi. 10.1080/10486800208568659
- By:
- Publication type:
- Article