Lexicon Grammaticorum


Book Description

Lexicon Grammaticorum is a biographical and bibliographical reference work on the history of all the world's traditions of linguistics. Each article consists of a short definition, details of the life, work and influence of the subject and a primary and secondary bibliography. The authors include some of the most renowned linguistic scholars alive today. For the second edition, twenty co-editors were commissioned to propose articles and authors for their areas of expertise. Thus this edition contains some 500 new articles by more than 400 authors from 25 countries in addition to the completely revised 1.500 articles from the first edition. Attention has been paid to making the articles more reader-friendly, in particular by resolving abbreviations in the textual sections. Key features: essential reference book for linguists worldwide 500 new articles over 400 contributors of 25 countries







A Tibetan Verb Lexicon


Book Description

The first Tibetan-English verb resource to be published in more than 30 years. It is a verb dictionary containing extensive lexical information--there is over 1,700 root verb forms and phrasal verb sub-entries.




Practical English Phonetics and Phonology


Book Description

Routledge English Language Introductions cover core areas of language study and are one-stop resources for students. Assuming no prior knowledge, books in the series offer an accessible overview of the subject, with activities, study questions, sample analyses, commentaries and key readings – all in the same volume. The innovative and flexible ‘two-dimensional’ structure is built around four sections – Introduction, Development, Exploration and Extension – which offer self-contained stages for study. Revised and updated throughout, this fourth edition of Practical English Phonetics and Phonology: presents the essentials of the subject and their day-to-day applications in an engaging and accessible manner; covers all the core concepts of phonetics and phonology, such as the phoneme, syllable structure, production of speech, vowel and consonant possibilities, glottal settings, stress, rhythm, intonation and the surprises of connected speech; incorporates classic readings from key names in the discipline; outlines the sound systems of six key languages from around the world (Spanish, French, Italian, German, Polish and Japanese); is accompanied by a brand-new companion website which hosts a collection of samples provided by genuine speakers of 25 accent varieties from Britain, Ireland, the USA, Canada, Australia, New Zealand, South Africa, India, Singapore and West Africa, as well as transcriptions, further study questions, answer keys, links to further reading and numerous recordings to accompany activities in the book. This edition has been completely reorganised and new features include: updated descriptions of the sounds of modern English and the adoption of the term General British (GB); considerable expansion of the treatment of intonation, including new recordings; and two new readings by David Crystal and John Wells. Written by authors who are experienced teachers and researchers, this best-selling textbook will appeal to all students of English language and linguistics and those training for a certificate in TEFL.




Bonaventura Vulcanius, Works and Networks


Book Description

This volume gathers studies and documentation on Bonaventura Vulcanius, a versatile philologist and writer who in 1581 settled in Leiden as a Professor of Greek and Latin. It includes many unpublished texts pertaining to this mysterious figure Dutch Humanism.




Teuffels History of Roman Literature


Book Description

Nachdruck des Originals von 1886.




The History of Information Security


Book Description

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate. - Interdisciplinary coverage of the history Information Security- Written by top experts in law, history, computer and information science- First comprehensive work in Information Security




A Dictionary of Names, Nicknames and Surnames, of Persons, Places and Things


Book Description

This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work is in the "public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.




Breaking the Unbreakable


Book Description

In this thesis we study device-independent quantum key distribution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key distribution thanks to the reduced complexity when compared to other quantum key distribution protocols. However, there still exist a number of loopholes that must be understood and eliminated in order to rule out eavesdroppers. We study several relevant loopholes and show how they can be used to break the security of energy-time entangled systems. Attack strategies are reviewed as well as their countermeasures, and we show how full security can be re-established. Quantum key distribution is in part based on the profound no-cloning theorem, which prevents physical states to be copied at a microscopic level. This important property of quantum mechanics can be seen as Nature's own copy-protection, and can also be used to create a currency based on quantummechanics, i.e., quantum money. Here, the traditional copy-protection mechanisms of traditional coins and banknotes can be abandoned in favor of the laws of quantum physics. Previously, quantum money assumes a traditional hierarchy where a central, trusted bank controls the economy. We show how quantum money together with a blockchain allows for Quantum Bitcoin, a novel hybrid currency that promises fast transactions, extensive scalability, and full anonymity. En viktig konsekvens av kvantmekaniken är att okända kvanttillstånd inte kan klonas. Denna insikt har gett upphov till kvantkryptering, en metod för två parter att med perfekt säkerhet kommunicera hemligheter. Ett komplett bevis för denna säkerhet har dock låtit vänta på sig eftersom en attackerare i hemlighet kan manipulera utrustningen så att den läcker information. Som ett svar på detta utvecklades apparatsoberoende kvantkryptering som i teorin är immun mot sådana attacker. Apparatsoberoende kvantkryptering har en mycket högre grad av säkerhet än vanlig kvantkryptering, men det finns fortfarande ett par luckor som en attackerare kan utnyttja. Dessa kryphål har tidigare inte tagits på allvar, men denna avhandling visar hur även små svagheter i säkerhetsmodellen läcker information till en attackerare. Vi demonstrerar en praktisk attack där attackeraren aldrig upptäcks trots att denne helt kontrollerar systemet. Vi visar också hur kryphålen kan förhindras med starkare säkerhetsbevis. En annan tillämpning av kvantmekanikens förbud mot kloning är pengar som använder detta naturens egna kopieringsskydd. Dessa kvantpengar har helt andra egenskaper än vanliga mynt, sedlar eller digitala banköverföringar. Vi visar hur man kan kombinera kvantpengar med en blockkedja, och man får då man en slags "kvant-Bitcoin". Detta nya betalningsmedel har fördelar över alla andra betalsystem, men nackdelen är att det krävs en kvantdator.