By using echoes in some sonnets to lines in certain plays, emphasizing those echoes which were not later repeated, and by applying dates to those plays, in 1926 Elizabeth Beckwith tentatively dated a third of the 154 ...By using echoes in some sonnets to lines in certain plays, emphasizing those echoes which were not later repeated, and by applying dates to those plays, in 1926 Elizabeth Beckwith tentatively dated a third of the 154 in the entire sonnets cycle. Her belief was that an unintentional authorial pattern of usage would be less subjective than other approaches to dating the sonnets. Yet, by use of dates from external allusions later applied by Prof. Leslie Hotson and other scholars, this author suggests that it may be possible to extend the total number of datable sonnets to over half of the cycle. However, Beckwith did not use dates for the plays which were later to become a standard dating scheme accepted by most scholars today, and so adjustments of her dates would change the dates she awarded to many of her selected sonnets. This author suggests that even the standard dating scheme is flawed, particularly if Shakespeare was dead when the Sonnets were published in 1609. He suggests another dating regime that meshes quite well with both Beckwith's 52 and an additional 27. Thus, the result for the 79 sonnets is to avoid certain problems in the distribution that Beckwith's method generated. The net result is what Beckwith termed "a skeleton around which the remaining sonnets can be safely built", but for over half rather than only a third of the cycle. This author suggests a half"skeleton" is more indicative of the chronology for the whole sonnets cycle than only a third.展开更多
An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is show...An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity.展开更多
文摘By using echoes in some sonnets to lines in certain plays, emphasizing those echoes which were not later repeated, and by applying dates to those plays, in 1926 Elizabeth Beckwith tentatively dated a third of the 154 in the entire sonnets cycle. Her belief was that an unintentional authorial pattern of usage would be less subjective than other approaches to dating the sonnets. Yet, by use of dates from external allusions later applied by Prof. Leslie Hotson and other scholars, this author suggests that it may be possible to extend the total number of datable sonnets to over half of the cycle. However, Beckwith did not use dates for the plays which were later to become a standard dating scheme accepted by most scholars today, and so adjustments of her dates would change the dates she awarded to many of her selected sonnets. This author suggests that even the standard dating scheme is flawed, particularly if Shakespeare was dead when the Sonnets were published in 1609. He suggests another dating regime that meshes quite well with both Beckwith's 52 and an additional 27. Thus, the result for the 79 sonnets is to avoid certain problems in the distribution that Beckwith's method generated. The net result is what Beckwith termed "a skeleton around which the remaining sonnets can be safely built", but for over half rather than only a third of the cycle. This author suggests a half"skeleton" is more indicative of the chronology for the whole sonnets cycle than only a third.
基金supported by the National Natural Science Foundation of China (Grants Nos.61202451 and 61103210)Fujian Province Science and Technology Cooperation Projects (Grant No.2010H6007)+2 种基金Foundation of Fujian Education Bureau (Grant No.JA12062)Program for Innovative Re search Team in Science and Technology in Fujian Province Universitya Key Project of Fujian Provincial Universities-Information Technology Research Based on Mathematics
文摘An arbitrated quantum signature scheme without using entangled states is proposed.In the scheme,by employing a classical hash function and random numbers,the secret keys of signer and receiver can be reused.It is shown that the proposed scheme is secure against several well-known attacks.Specifically,it can stand against the receiver’s disavowal attack.Moreover,compared with previous relevant arbitrated quantum signature schemes,the scheme proposed has the advantage of less transmission complexity.