You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the First SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, CISC 2005, held in Beijing, China in December 2005. The 33 revised full papers and 32 short papers presented together with 2 invited papers were carefully reviewed and selected from 196 submissions. The papers are organized in topical sections on identity based cryptography, security modelling, systems security, signature schemes, symmetric key mechanisms, zero-knowledge and secure computations, threshold cryptography, intrusion detection systems, protocol cryptanalysis, ECC algorithms, applications, secret sharing, and denial of service attacks.
Islam and Christianity are often presented as violent rivals facing each other across a gulf of insurmountable differences. Yet if Christians are to effectively engage Muslims with the gospel, they must learn to build bridges across this divide. This study explores the Muslim presence in Ghana, a nation once believed to be resistant to Islam, and analyses the missiological implications for Pentecostals, the fastest growing group of Christians in the country. Dr. Dieudonne Komla Nuekpe examines the shared spiritual heritage of Ghanaian Pentecostals and folk Muslims within the broader context of African traditional religion. He proposes that this shared heritage – with its emphasis on supern...
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.
None
This is a timely and comprehensive guide to one of the most volatile, misunderstood, and potentially dangerous states in the world, and one of great strategic importance to U.S. interests in Asia. Featuring a detailed "who's who" section, it covers politics, the economy, the military, education, and culture, and provides numerous vital statistical data.
This book encompasses the most updated and recent account of research and implementation of Microbial Electrochemical Technologies (METs) from pioneers and experienced researchers in the field who have been working on the interface between electrochemistry and microbiology/biotechnology for many years. It provides a holistic view of the METs, detailing the functional mechanisms, operational configurations, influencing factors governing the reaction process and integration strategies. The book not only provides historical perspectives of the technology and its evolution over the years but also the most recent examples of up-scaling and near future commercialization, making it a must-read for ...