Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Donghak Concept of God/heaven
  • Language: en
  • Pages: 168

The Donghak Concept of God/heaven

  • Type: Book
  • -
  • Published: 2007
  • -
  • Publisher: Peter Lang

Original Scholarly Monograph

The Korean Singer of Tales
  • Language: en
  • Pages: 251

The Korean Singer of Tales

P'ansori, the traditional oral narrative of Korea, is sung by a highly trained soloist to the accompaniment of complex drumming. The singer both narrates the story and dramatizes all the characters, male and female. Performances require as long as six hours and make extraordinary vocal demands. In the first book-length treatment in English of this remarkable art form, Pihl traces the history of p'ansori from its roots in shamanism and folktales through its nineteenth-century heyday under highly acclaimed masters and discusses its evolution in the twentieth century. After examining the place of p'ansori in popular entertainment and its textual tradition, he analyzes the nature of texts in the...

Information Security and Privacy
  • Language: en
  • Pages: 546

Information Security and Privacy

This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.

Information Security, Practice and Experience
  • Language: en
  • Pages: 410

Information Security, Practice and Experience

  • Type: Book
  • -
  • Published: 2010-05-09
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience, ISPEC 2010, held in Seoul, Korea, in May 2010. The 28 papers presented in this volume were carefully reviewed and selected from 91 submissions. They are grouped in sections on cryptanalysis, algorithms and implementations, network security, access control, identity management, trust management, public key cryptography, and security applications.

Intelligent Security Solutions for Cyber-Physical Systems
  • Language: en
  • Pages: 282

Intelligent Security Solutions for Cyber-Physical Systems

  • Type: Book
  • -
  • Published: 2024-04-22
  • -
  • Publisher: CRC Press

A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management Showcases cyber-physical systems (CPSs) security solutions, lightweight ...

Writing Women in Korea
  • Language: en
  • Pages: 200

Writing Women in Korea

Writing Women in Korea explores the connections among translation, new forms of writing, and new representations of women in Korea from the early 1900s to the late 1930s. It examines shifts in the way translators handled material pertaining to women, the work of women translators of the time, and the relationship between translation and the original works of early twentieth-century Korean women writers. The book opens with an outline of the Chosôn period (1392-1910), when a vernacular writing system was invented, making it possible to translate texts into Korean--in particular, Chinese writings reinforcing official ideals of feminine behavior aimed at women. The legends of European heroines...

Information Security and Cryptology – ICISC 2016
  • Language: en
  • Pages: 355

Information Security and Cryptology – ICISC 2016

  • Type: Book
  • -
  • Published: 2017-02-08
  • -
  • Publisher: Springer

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.

Information Security Applications
  • Language: en
  • Pages: 356

Information Security Applications

This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23–25, 2023. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.

Information Security and Cryptology - ICISC 2014
  • Language: en
  • Pages: 444

Information Security and Cryptology - ICISC 2014

  • Type: Book
  • -
  • Published: 2015-03-16
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

Advances in Cryptology - ASIACRYPT 2013
  • Language: en
  • Pages: 567

Advances in Cryptology - ASIACRYPT 2013

  • Type: Book
  • -
  • Published: 2013-11-23
  • -
  • Publisher: Springer

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.