You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In the past dozen or so years, cryptology and computational number theory have become increasingly intertwined. Because the primary cryptologic application of number theory is the apparent intractability of certain computations, these two fields could part in the future and again go their separate ways. But for now, their union is continuing to bring ferment and rapid change in both subjects. This book contains the proceedings of an AMS Short Course in Cryptology and Computational Number Theory, held in August 1989 during the Joint Mathematics Meetings in Boulder, Colorado. These eight papers by six of the top experts in the field will provide readers with a thorough introduction to some of ...
The World Wide Web is truly astounding. It has changed the way we interact, learn and innovate. It is the largest sociotechnical system humankind has created and is advancing at a pace that leaves most in awe. It is an unavoidable fact that the future of the world is now inextricably linked to the future of the Web. Almost every day it appears to change, to get better and increase its hold on us. For all this we are starting to see underlying stability emerge. The way that Web sites rank in terms of popularity, for example, appears to follow laws with which we are familiar. What is fascinating is that these laws were first discovered, not in fields like computer science or information techno...
The central thesis of The Web's Awake is that the phenomenal growth and complexity of the web is beginning to outstrip our capability to control it directly. Many have worked on the concept of emergent properties within highly complex systems, concentrating heavily on the underlying mechanics concerned. Few, however, have studied the fundamentals involved from a sociotechnical perspective. In short, the virtual anatomy of the Web remains relatively uninvestigated. The Web's Awake attempts to seriously explore this gap, citing a number of provocative, yet objective, similarities from studies relating to both real world and digital systems. It presents a collage of interlinked facts, assertions, and coincidences, which boldly point to a Web with powerful potential for life.
This volume contains the 14 contributed papers and the contribution of the distinguished invited speaker B ́ ela Bollob ́ as presented at the 3rd Workshop on Algorithms and Models for the Web-Graph (WAW 2004), held in Rome, Italy, October 16, 2004, in conjunction with the 45th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2004). The World Wide Web has become part of our everyday life and information retrievalanddataminingontheWebisnowofenormouspracticalinterest.Some of the algorithms supporting these activities are based substantially on viewing the Web as a graph, induced in various ways by links among pages, links among hosts, or other similar networks. Theaimofthe2004Wo...
This text takes a focused and comprehensive look at mining data represented as a graph, with the latest findings and applications in both theory and practice provided. Even if you have minimal background in analyzing graph data, with this book you’ll be able to represent data as graphs, extract patterns and concepts from the data, and apply the methodologies presented in the text to real datasets. There is a misprint with the link to the accompanying Web page for this book. For those readers who would like to experiment with the techniques found in this book or test their own ideas on graph data, the Web page for the book should be http://www.eecs.wsu.edu/MGD.
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Malaysia, held in Kuala Lumpur, Malaysia in September 2005, in conjunction with the e-Secure Malaysia 2005 convention. The 19 revised full papers presented together with 3 invited papers were carefully reviewed and selected from a total of 90 submissions. The papers are organized in topical sections on stream ciphers analysis, cryptography based on combinatorics, cryptographic protocols, implementation issues, unconventional cryptography, block cipher cryptanalysis, and homomorphic encryption.
This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.
This book constitutes the refereed proceedings of the 5th International Algorithmic Number Theory Symposium, ANTS-V, held in Sydney, Australia, in July 2002. The 34 revised full papers presented together with 5 invited papers have gone through a thorough round of reviewing, selection and revision. The papers are organized in topical sections on number theory, arithmetic geometry, elliptic curves and CM, point counting, cryptography, function fields, discrete logarithms and factoring, Groebner bases, and complexity.
Communities are groupings of distributed objects that are capable of com- nicating, directly or indirectly, through the medium of a shared context. To support communities on a wide scale will require developments at all levels of computing, from low-level communication protocols supporting transparent - cess to mobile objects, through to distributed operating systems, through to high-level programming models allowing complex interaction between objects. This workshop brought together researchers interested in the technical issues of supporting communities. This workshop was the third in the DCW series. The ?rst two, entitled D- tributed Computing on the Web, took place in 1998 and 1999 at th...