You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Formed by a small group of university students in the early 1980s, Studio Gainax is now one of the most adventurous and widely esteemed anime companies on the scene. And it is fascinating for its unique approach to animation. Formal experimentation, genre-straddling, self-reflexivity, unpredictable plot twists, a gourmet palate for stylishness, proverbially controversial endings, and a singularly iconoclastic worldview are some of the hallmarks. This documentation of the studio's achievements provides a critical overview of both the company and its films: in-depth examinations of particular titles that best represent the company's overall work, including television series such as Nadia: The Secret of Blue Water and Neon Genesis Evangelion, and feature films such as Royal Space Force: The Wings of Honneamise and Gunbuster vs. Diebuster. Each chapter highlights the contribution made by a specific production to the company's progress.
Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two successful TrustBus inter- tional workshops, held in 2002 and 2003 in conjunction with the DEXA conferences in Aix-en-Provence and in Prague. Being the first of a planned series of successful conferences it was our goal that this event would initiate a forum to bring together researchers from academia and commercial developers from industry to discuss the state of the art of technology for establishing trust and privacy in digital business. We thank you all the attendees for co...
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in Tokyo, Japan, in March 2013. The 36 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers cover topics such as study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones; formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography.
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.
This book constitutes the thoroughly refereed proceedings of the PKC Public Key Cryptography, PKC 2002, held in Paris, France in February 2002. This book presents 26 carefully reviewed papers selected from 69 submissions plus one invited talk. Among the topics addressed are encryption schemes, signature schemes, protocols, cryptanalysis, elliptic curve cryptography, and side channels.
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Ano
This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2004, held in Singapore in March 2004. The 32 revised full papers presented were carefully reviewed and selected from 106 submissions. All current issues in public key cryptography are addressed ranging from theoretical and mathematical foundations to a broad variety of public key cryptosystems.
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
Stresses the Potential Applications of Biosurfactants in Various Industries Environmental concerns and a demand for sustainable chemical production have become important issues in recent years. As a result, microbial biosurfactant-producing systems are gaining momentum as potential replacements for chemical surfactants. Biosurfactants: Production and Utilization—Processes, Technologies, and Economics explores the production, utilization, and industrial/economic use of biosurfactants in modern biotechnology. This book represents comprehensive material developed by contemporary experts in the field. Focusing on research and developments within the last 20 years, it highlights relevant change...