1,717 research outputs found

    Turning Toward Feeling

    Get PDF
    Five years ago, upon completing a 200-hour, 30-day intensive yoga teacher-training course, we took this group photo. Painted on the wall behind us are the words, “Feel pain? Change positions.” At that time in my life, my understanding of this assertion was shallow: if it feels as though something is ripping, pulling, or tearing, move out of the yoga pose. But as for other physical and emotional pain, I had been taught to sit with it and accept it, and by doing so I would demonstrate strength and continue to grow stronger. Turning away from pain seemed cowardly. It wasn’t until this program that I learned that pain is one of many expressions of feeling that carries inherent wisdom, and learning to feel fully and to respond appropriately is the essence of sustainability

    Investment-Backed Expectations and Regulatory Risk in \u3ci\u3eGood v. United States\u3c/i\u3e

    Get PDF

    Investment-Backed Expectations and Regulatory Risk in \u3ci\u3eGood v. United States\u3c/i\u3e

    Get PDF

    Evaluation of liquid methane storage and transfer problems in supersonic aircraft

    Get PDF
    Evaluation of liquid methane storage and transfer problems for future supersonic aircraft cryogenic fuel requirement

    Dairy Herd Management

    Get PDF
    PDF pages: 3

    Hash-based signatures for the internet of things

    Get PDF
    While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely flexible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous parameters defining aspects such as signing speed and key size, that enable trade-offs in constrained environments. Simplicity of implementation and customization make hash based signatures an attractive candidate for the IoT ecosystem, which is composed of a number of diverse, constrained devices
    corecore