Works about IMPERSONATION
Results: 305
Performing Blackness on English Stages, 1500-1800.
- Published in:
- 2006
- By:
- Publication type:
- Book Review
'The top of woman! All her sex in abstract!': Ben Jonson Directs the Boy Actor in The Devil is an Ass.
- Published in:
- Early Theatre, 2005, v. 8, n. 2, p. 11, doi. 10.12745/et.8.2.700
- By:
- Publication type:
- Article
Transversal Poetics and Fugitive Explorations: Subject Performance, Early Modern English Theatre, and Macbeth.
- Published in:
- Early Theatre, 2004, v. 7, n. 2, p. 108
- By:
- Publication type:
- Article
ČAPAKOBA, THE MAYO EASTER CEREMONIAL IMPERSONATOR: EXPLANATIONS OF RITUAL CLOWNING.
- Published in:
- Journal for the Scientific Study of Religion, 1969, v. 8, n. 1, p. 1, doi. 10.2307/1385250
- By:
- Publication type:
- Article
In the Egosphere: Philip Roth's Anti-Bildungsroman.
- Published in:
- 1989
- By:
- Publication type:
- Literary Criticism
An improved feature extraction for Hindi language audio impersonation attack detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 25, p. 66565, doi. 10.1007/s11042-023-18104-9
- By:
- Publication type:
- Article
Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 1, p. 1, doi. 10.1049/ntw2.12054
- By:
- Publication type:
- Article
Registration and Impersonation in A Tale of Two Cities.
- Published in:
- SEL: Studies in English Literature (Johns Hopkins), 2021, v. 61, n. 4, p. 641, doi. 10.1353/sel.2021.a910833
- By:
- Publication type:
- Article
The Jew of Malta and the Diabolic Power of Theatrics in the 1580s.
- Published in:
- SEL: Studies in English Literature (Johns Hopkins), 2006, v. 46, n. 2, p. 257, doi. 10.1353/sel.2006.0016
- By:
- Publication type:
- Article
Dramatic Images of Kingship in Heywood and Bale.
- Published in:
- SEL: Studies in English Literature (Johns Hopkins), 1999, v. 39, n. 2, p. 239, doi. 10.2307/1556164
- By:
- Publication type:
- Article
More than the Shadow of a Doubt: Dream Theory and the Impersonation of Saints by Angels.
- Published in:
- Mukaddime Journal, 2018, v. 9, n. 1, p. 45, doi. 10.19059/mukaddime.342398
- By:
- Publication type:
- Article
Fake Officers/Real Police: What Are Pi-lícias Doing in the Streets of Rio de Janeiro?
- Published in:
- Cambridge Journal of Anthropology, 2024, v. 42, n. 2, p. 97, doi. 10.3167/cja.2024.420208
- By:
- Publication type:
- Article
Designing a Robust Quantum Signature Protocol Based on Quantum Key Distribution for E-Voting Applications.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 16, p. 2558, doi. 10.3390/math12162558
- By:
- Publication type:
- Article
Secure Authentication in the Smart Grid.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 1, p. 176, doi. 10.3390/math11010176
- By:
- Publication type:
- Article
Improvement and Cryptanalysis of a Physically Unclonable Functions Based Authentication Scheme for Smart Grids.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 1, p. 48, doi. 10.3390/math11010048
- By:
- Publication type:
- Article
Security of a PUF Mutual Authentication and Session Key Establishment Protocol for IoT Devices.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 22, p. 4310, doi. 10.3390/math10224310
- By:
- Publication type:
- Article
A Pairing-free Provable Secure and Efficient Identity-based Identification Scheme with Anonymity.
- Published in:
- Malaysian Journal of Mathematical Sciences, 2023, v. 17, n. 4, p. 705, doi. 10.47836/mjms.17.4.11
- By:
- Publication type:
- Article
All shook up.
- Published in:
- China Business Review, 1996, v. 23, n. 1, p. 63
- By:
- Publication type:
- Article
Blockchain-Enabled Secure and Interoperable Authentication Scheme for Metaverse Environments.
- Published in:
- Future Internet, 2024, v. 16, n. 5, p. 166, doi. 10.3390/fi16050166
- By:
- Publication type:
- Article
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure.
- Published in:
- Future Internet, 2023, v. 15, n. 4, p. 146, doi. 10.3390/fi15040146
- By:
- Publication type:
- Article
An Efficient Identification Scheme Based on Bivariate Function Hard Problem.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 9, p. 1784, doi. 10.3390/sym14091784
- By:
- Publication type:
- Article
Security and Privacy Analysis of Vinoth et al.'s Authenticated Key Agreement Scheme for Industrial IoT.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 10, p. 1952, doi. 10.3390/sym13101952
- By:
- Publication type:
- Article
New Secure and Practical E-Mail Protocol with Perfect Forward Secrecy.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 7, p. 1144, doi. 10.3390/sym13071144
- By:
- Publication type:
- Article
INQUADRAMENTO FENOMENOLOGICO-ESISTENZIALE DELLA PATOLOGIA ISTERICA.
- Published in:
- Psichiatria e Psicoterapia, 2013, v. 32, n. 3, p. 203
- By:
- Publication type:
- Article
Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 13, p. 10264, doi. 10.3390/su151310264
- By:
- Publication type:
- Article
IoT Device-to-Cloud Continuous Authentication using Lightweight Key Establishment Mechanism.
- Published in:
- Journal of Electrical Systems, 2023, v. 19, n. 2, p. 148
- By:
- Publication type:
- Article
Situational and Contextual Factors Sustaining Police Impersonation in Nigeria.
- Published in:
- Policing: A Journal of Policy & Practice, 2020, v. 14, n. 2, p. 428, doi. 10.1093/police/pay024
- By:
- Publication type:
- Article
The somewhat different diva: Impersonation, ambivalence and the musical comedy performances of Julian Eltinge.
- Published in:
- Studies in Musical Theatre, 2018, v. 12, n. 1, p. 9, doi. 10.1386/smt.12.1.9_1
- By:
- Publication type:
- Article
Tres son multitud: suplantación, instrumentalidad y huellas de sedición en los vínculos epistolares de Alexander von Humboldt, Francisco José de Caldas y José Celestino Mutis.
- Published in:
- IBEROAMERICANA. América Latina - España - Portugal, 2019, v. 18, n. 70, p. 25
- By:
- Publication type:
- Article
La personificación de ˀAhkan en el Dintel 3 del Templo IV de Tikal.
- Published in:
- Boletín del Museo Chileno de Arte Precolombino, 2024, v. 29, n. 1, p. 77, doi. 10.56522/BMCHAP.0010010290004
- By:
- Publication type:
- Article
The Aesthetics of Impersonation and Depersonalization: Samuel Beckett and Philip Roth.
- Published in:
- Philip Roth Studies, 2018, v. 14, n. 2, p. 16, doi. 10.5703/philrothstud.14.2.0016
- By:
- Publication type:
- Article
The handling of political disinformation in the TV series Yes, Minister (BBC, 1980-1984) and its impact on YouTube.
- Published in:
- Analisi: Quaderns de Comunicacio i Cultura, 2021, n. 64, p. 9, doi. 10.5565/rev/analisi.3424
- By:
- Publication type:
- Article
MEN PERFORMING AS WOMEN: EXPLORATIONS IN THE WORLD OF FEMALE IMPERSONATORS.
- Published in:
- Sociological Spectrum, 1993, v. 13, n. 4, p. 465, doi. 10.1080/02732173.1993.9982045
- By:
- Publication type:
- Article
Doing the Amateur Casual: Victorian Investigative Journalism and the Legacy of James Greenwood's "A Night in a Workhouse".
- Published in:
- Victorian Studies, 2021, v. 63, n. 3, p. 401, doi. 10.2979/victorianstudies.63.3.04
- By:
- Publication type:
- Article
'Steely Velvet': The Voice of James Mason.
- Published in:
- Journal of British Cinema & Television, 2015, v. 12, n. 1, p. 83, doi. 10.3366/jbctv.2015.0244
- By:
- Publication type:
- Article
Plato, Procedures, and Artificial Everything.
- Published in:
- TDR: The Drama Review (MIT Press), 2019, v. 63, n. 4, p. 113, doi. 10.1162/dram_a_00878
- By:
- Publication type:
- Article
The Decision Dilemma.
- Published in:
- TDR: The Drama Review (MIT Press), 2016, v. 60, n. 3, p. 96, doi. 10.1162/DRAM_a_00572
- By:
- Publication type:
- Article
Mullah Mansour's Theatrical Triumph, and Our Loss.
- Published in:
- TDR: The Drama Review (MIT Press), 2011, v. 55, n. 2, p. 7, doi. 10.1162/DRAM_a_00066
- By:
- Publication type:
- Article
Mattia Pascal's Punitive Mask.
- Published in:
- Italica, 2015, v. 92, n. 2, p. 358
- By:
- Publication type:
- Article
IMPERSONATION AND AUTHENTICITY: THE THEATRE AS METAPHOR IN KOPIT'S INDIANS.
- Published in:
- Quarterly Journal of Speech, 1973, v. 59, n. 4, p. 443, doi. 10.1080/00335637309383194
- By:
- Publication type:
- Article
Toward designing a lightweight RFID authentication protocol for constrained environments.
- Published in:
- IET Communications (Wiley-Blackwell), 2024, v. 18, n. 14, p. 846, doi. 10.1049/cmu2.12794
- By:
- Publication type:
- Article
An exploration of gender from the perspective of cisgender male drag queens.
- Published in:
- Journal of Gender Studies, 2020, v. 29, n. 3, p. 325, doi. 10.1080/09589236.2019.1668260
- By:
- Publication type:
- Article
JUST LIKE THE REAL THING: In the POW camps of the Second World War, soldiers found release - from the conditions and from the all-male company - in female impersonation.
- Published in:
- History Today, 2017, v. 67, n. 12, p. 44
- By:
- Publication type:
- Article
デジタル時代のアニメコンテンツ支持形成 --「鬼滅の刃」にみる魅力的なサブキャラクターへの 愛着が及ぼす影響--
- Published in:
- Kodo Keiryogaku, 2023, v. 49, n. 2, p. 103
- By:
- Publication type:
- Article
The perception of the cyberbullying phenomenon among Estonian students: Comparison of boys and girls on the basis of cyberbullying criteria and types of behaviour.
- Published in:
- Estonian Journal of Education / Eesti Haridusteaduste Ajakiri, 2015, v. 3, n. 2, p. 211, doi. 10.12697/eha.2015.3.2.07
- By:
- Publication type:
- Article
mpact factors involved in cryptoperiod computation in key compromise impersonation scenario.
- Published in:
- Annals of the University of Craiova. Mathematics & Computer Science Series, 2019, v. 46, n. 2, p. 392
- By:
- Publication type:
- Article
The "Batman Effect": Improving Perseverance in Young Children.
- Published in:
- 2017
- By:
- Publication type:
- journal article
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability.
- Published in:
- International Journal of Intelligent Systems, 2023, p. 1, doi. 10.1155/2023/9731239
- By:
- Publication type:
- Article
Lattice‐based batch authentication scheme with dynamic identity revocation in VANET.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 11, p. 9442, doi. 10.1002/int.23004
- By:
- Publication type:
- Article
An efficient and provably secure authenticated key agreement scheme for mobile edge computing.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 7, p. 2983, doi. 10.1007/s11276-022-03005-w
- By:
- Publication type:
- Article