Results 11 to 20 of about 52,259 (246)
Authenticity and The Authentic Enterprise [PDF]
Commentary on the Arthur W. Page Society's report, The Authentic Enterprise, and its conceptualisation of authenticity.
openaire +1 more source
Authenticity has long been a lynchpin of our thinking about heritage. It is a threshold question as to whether we even consider something to be heritage. Because authenticity is a threshold question, we have often assumed it and its relevance. Scholarship on authenticity therefore focuses on how it is created and (re)negotiated, seldom scrutinising the
openaire +2 more sources
Authentic Interpretation [PDF]
AbstractI approach the identification of the principles of legal interpretation through a discussion of an important but largely forgotten strand in our legal heritage: the idea (and at some points in English law, the rule) that the interpretation of legislation is to be done by the lawmaker.
openaire +2 more sources
State authenticity is the sense that one is currently in alignment with one’s true or real self. We discuss state authenticity as seen by independent raters, describe its phenomenology, outline its triggers, consider its well-being and behavioral implications, and sketch out a cross-disciplinary research agenda.
Sedikides, Constantine +3 more
openaire +3 more sources
Distributed and efficient identity authentication based on consortium blockchain
In order to solve the problems of cumbersome user authentication process, insecure identity information, and vulnerability of authentication system in traditional identity authentication, a distributed identity authentication method based on alliance ...
Yao Ying +4 more
doaj +1 more source
Lycium chinense Mill, an important Chinese herbal medicine, is widely used as a dietary supplement and food. Here the chloroplast (CP) genome of L. chinense was sequenced and analyzed, revealing a size of 155,756 bp and with a 37.8% GC content.
Zerui Yang +5 more
doaj +1 more source
Impact of Globalisation on Data Security – Authentication Issues [PDF]
Research background: In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types of information systems.
Hub Miloslav +1 more
doaj +1 more source
The downregulation of NCXs is positively correlated with the prognosis of stage II–IV colon cancer
Purpose Colon cancer (CC) is a very common gastrointestinal tumor that is prone to invasion and metastasis in the late stage. This study aims to observe the expression of Na+/Ca2+ exchangers (NCXs) and analyze the correlation between NCXs and the ...
Zhixiu Xia, Changliang Wang, Hong Zhang
doaj +1 more source
Comprehensive Analysis of Rhodomyrtus tomentosa Chloroplast Genome
In the last decade, several studies have relied on a small number of plastid genomes to deduce deep phylogenetic relationships in the species-rich Myrtaceae.
Yuying Huang +5 more
doaj +1 more source
Questioning Authenticity [PDF]
Authenticity is an important category in cultural debates, which has emerged in parallel with the notion of modernity. Authenticity refers to the idea that something is “real” or “true,” that its outer appearance is in correspondence with its inner being, in contrast with things that are “fake” or “false” or “dissimulating.” Although the term thus ...
openaire +2 more sources

