You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.
Shows how financial globalization can be perilous, holding the capacity to finance the durability of authoritarian governments.
The management of services and operations in today’s organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN). An enterprise LAN consists of a set of network zones (logical group of networkelements)correspondingto di?erent departments orsections,connected through various interface switches (typically, Layer-3 switches). The network service accesses between these zones and also with the external network (e. g. , Internet) are governed by a global network security policy of the organization. This global policy is de?ned as a collection of service access rules across various network zones where the services referred network applications conform...
This volume constitutes the second of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 66 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on networks and communications; network and communications security; wireless and mobile networks.
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.
This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and Networking, ICDCN 2006, held in Guwahati, India in December 2006. Coverage in this volume includes ad hoc networks, distributed computing and algorithms, security, grid and P2P computing, performance evaluation, internetworking protocols and applications, optical networks and multimedia, sensor networks, and wireless networks.
The fifth volume on the history of the Reserve Bank of India covers the years from 1997–98 to 2007–08. During this period, it introduced key institutional and financial market reforms in a rapidly changing economic environment and facilitated faster integration of the Indian economy. The Bank rationalised and introduced innovative instruments of monetary control; strengthened regulatory and supervisory processes for both banking and non-banking sectors; adjusted its approach to achieve and sustain financial stability; focussed on building financial market institutions and infrastructure; and spurred legal and other amendments in the larger public interest as also for achieving flexibility with stability in the economy. It also worked to improve the rural credit system, financial inclusion and customer protection. This volume is a narrative history of the Bank and also a rich resource for understanding how an emerging market central bank manages change and shapes the economy to face future challenges.