You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Original Scholarly Monograph
P'ansori, the traditional oral narrative of Korea, is sung by a highly trained soloist to the accompaniment of complex drumming. The singer both narrates the story and dramatizes all the characters, male and female. Performances require as long as six hours and make extraordinary vocal demands. In the first book-length treatment in English of this remarkable art form, Pihl traces the history of p'ansori from its roots in shamanism and folktales through its nineteenth-century heyday under highly acclaimed masters and discusses its evolution in the twentieth century. After examining the place of p'ansori in popular entertainment and its textual tradition, he analyzes the nature of texts in the...
Writing Women in Korea explores the connections among translation, new forms of writing, and new representations of women in Korea from the early 1900s to the late 1930s. It examines shifts in the way translators handled material pertaining to women, the work of women translators of the time, and the relationship between translation and the original works of early twentieth-century Korean women writers. The book opens with an outline of the Chosôn period (1392-1910), when a vernacular writing system was invented, making it possible to translate texts into Korean--in particular, Chinese writings reinforcing official ideals of feminine behavior aimed at women. The legends of European heroines...
This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.
This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols, cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security
This book constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience, ISPEC 2010, held in Seoul, Korea, in May 2010. The 28 papers presented in this volume were carefully reviewed and selected from 91 submissions. They are grouped in sections on cryptanalysis, algorithms and implementations, network security, access control, identity management, trust management, public key cryptography, and security applications.
A cyber-physical system (CPS) is a computer system in which a mechanism is controlled or monitored by computer-based algorithms and involves transdisciplinary approaches, merging theories of cybernetics, mechatronics, design, and process science. This text mainly concentrates on offering a foundational theoretical underpinning, and a comprehensive and coherent review of intelligent security solutions for cyber-physical systems. Features: Provides an overview of cyber-physical systems (CPSs) along with security concepts like attack detection methods, cyber-physical systems failures, and risk identification and management Showcases cyber-physical systems (CPSs) security solutions, lightweight ...
This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23–25, 2023. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.