You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. P...
This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.
The special theme of ISIT '98 is the 50th anniversary of the founding of the field of information theory in Claude Shannon's 1948 paper, A Mathematical Theory of Communication. Topics in these papers on the conference include nomadic computing, and CDMA in war and peace."
Chinese democracy is collective democracy, argues Chi-yu Shih in Collective Democracy. Democratization in China does not purport to enhance individual human rights; rather, it aims to preserve and promote a sense of community. Democratization is both an assurance that no one will be left alone in the process of development and reform, and an attempt to avoid the building of self-centered boundaries by social members. Consequently, elections for people's deputies, officials, and village directors serve to consolidate the appearance of social consensus. In the nascent Chinese democracy, contends the author, the stress on human relations and the institutionalization of collective interests provide a potentially effective check on the historically familiar abuse of power.
Coping with the Future: Theories and Practices of Divination in East Asia offers contributions to various practical and theoretical aspects of divination from antiquity to the present in East Asia.
None