You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Like Franz Kafka’s The Trial for the post-truth era, at once “surreal, polemical, and fun” (The Telegraph). Sterling Beckenbauer is plunged into a terrifying and nonsensical world one morning when they are attacked, then unfairly arrested, in their neighborhood in London. With the help of their friends, Sterling hosts a trial of their own in order to exonerate themselves and to hold the powers that be to account. Sterling Karat Gold, in the words of Kamila Shamsie, is “a madly brilliant and deeply sane novel that reveals surrealism as possibly the most effective way of talking about the political moment we find ourselves in.” In it, Isabel Waidner concocts a world replete with bull...
There are few more important areas of current research than this, and here, Springer has published a double helping of the latest work in the field. That’s because the book contains the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, and the co-located 1st International Workshop on Usable Security, both held in Trinidad/Tobago in February 2007. Topics covered include payment systems and authentication.
This book constitutes the refereed proceedings of the 27th International Colloquium on Automata, Languages and Programming, ICALP 2000, held in Geneva, Switzerland in July 2000. The 69 revised full papers presented together with nine invited contributions were carefully reviewed and selected from a total of 196 extended abstracts submitted for the two tracks on algorithms, automata, complexity, and games and on logic, semantics, and programming theory. All in all, the volume presents an unique snapshot of the state-of-the-art in theoretical computer science.
"I'm besotted with this beguiling, hilarious, rollocking, language-metamorphosing novel. The future of the queer avant-garde is safe with Isabel Waidner." Olivia Laing Gaudy Bauble stages a glittering world populated by GoldSeXUal StatuEttes, anti-drag kings, Gilbert-&-George-like lesbians, maverick detectives, a transgender army equipped with question-mark-shaped helmets, and birds who have dyke written all over them. Everyone interferes with the plot. No one is in control of the plot. Surprises happen as a matter of course: A faux research process produces actual results. Hundreds of lipstick marks reanimate a dying body. And the Deadwood-to-Dynamo Audience Prize goes to whoever turns deadestwood into dynamost. Gaudy Bauble stages what happens when the disenfranchised are calling the shots. Riff-raff are running the show and they are making a difference.
The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.
Focuses on Information Assurance, Security and Privacy Services. This book discusses Program Security, Data Security and Authentication, Internet Scourges, Web Security, Usable Security, Human-Centric Aspects, Security, Privacy and Access Control, Economic Aspects of Security, Threat Modeling, Intrusion and Response.
DISC, the International Symposium on DIStributed Computing, is an annual forum for research presentations on all facets of distributed computing. This volume includes 23 contributed papers and an invited lecture, all presented at DISC ’99, held on September 27-29, 1999 in Bratislava, Slovak Republic. In addition to regular submissions, the call for papers for DISC ’99 also - licited Brief Announcements (BAs). We received 60 regular submissions and 15 brief announcement submissions. These were read and evaluated by the p- gramcommittee, with the additional help of external reviewerswhen needed. At the program committee meeting on June 10-11 at Dartmouth College, Hanover, USA, 23 regular s...
This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated to Jean-Louis Lassez on the occasion of his 60th birthday and held in Chiang Mai, Thailand in December 2004. The 17 revised full papers presented together with 3 keynote papers and 16 invited papers honouring Jean-Louis Lassez were carefully reviewed and selected from 75 submissions. The contributed papers are focusing on higher-level decision making, whereas the invited papers address a broader variety of topics in theoretical computer science.
This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.