You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.
This book comprehensively summarizes important aspects of research in the active field of lignocellulosic (polymer) composites, including polymer materials from or containing cellulose, hemicellulose and lignin. It describes how these materials can be produced from forest products and natural fibers from sources such as jute, flax, sisal, and many more, and even from agricultural residues (like wheat straw, corn stover, or sugarcane bagasse). In times of high demand for renewable green materials, lignocellulosic materials from organic matter produced by trees, shrubs and agricultural crops present a highly attractive feedstock. The international authors explain different treatment and fabrication methods for the production of lignocellulosic materials. Other chapters address the properties of these green materials or illustrate specific applications, ranging from food packaging and household products to adsorbents and even conductive polymer composites. In this way, this book offers a broad and comprehensive overview over the entire field of lignocellulosic composite materials.
With our ever-increasing reliance on computer technology in every field of modern life, the need for continuously evolving and improving cyber security remains a constant imperative. This book presents the 3 keynote speeches and 10 papers delivered at the 2nd Singapore Cyber Security R&D Conference (SG-CRC 2017), held in Singapore, on 21-22 February 2017. SG-CRC 2017 focuses on the latest research into the techniques and methodologies of cyber security. The goal is to construct systems which are resistant to cyber-attack, enabling the construction of safe execution environments and improving the security of both hardware and software by means of mathematical tools and engineering approaches for the design, verification and monitoring of cyber-physical systems. Covering subjects which range from messaging in the public cloud and the use of scholarly digital libraries as a platform for malware distribution, to low-dimensional bigram analysis for mobile data fragment classification, this book will be of interest to all those whose business it is to improve cyber security.
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
Frontiers in Natural Product Chemistry is a book series devoted to publishing monographs that highlight important advances in natural product chemistry. The series covers all aspects of research in the chemistry and biochemistry of naturally occurring compounds, including research on natural substances derived from plants, microbes and animals. Reviews of structure elucidation, biological activity, organic and experimental synthesis of natural products as well as developments of new methods are also included in the series. Volume eight of the series brings seven reviews covering these main themes: marine natural products, neuroprotective natural products, chromenes, coumarin derivatives, and...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015. The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.
Our increased reliance on computer technology for all aspects of life, from education to business, means that the field of cyber-security has become of paramount importance to us all. This book presents the proceedings of the inaugural Singapore Cyber-Security R&D Conference (SG-CRC 2016), held in Singapore in January 2016, and contains six full and seven short peer-reviewed papers. The conference took as its theme the importance of introducing a technically grounded plan for integrating cyber-security into a system early in the design process, rather than as an afterthought. The element of design is integral to a process, be it a purely software system, such as one engaged in managing onlin...
Temporary structures are a vital but often overlooked component in the success of any construction project. With the assistance of modern technology, design and operation procedures in this area have undergone significant enhancements in recent years. Design Solutions and Innovations in Temporary Structures is a comprehensive source of academic research on the latest methods, practices, and analyses for effective and safe temporary structures. Including perspectives on numerous relevant topics, such as safety considerations, quality management, and structural analysis, this book is ideally designed for engineers, professionals, academics, researchers, and practitioners actively involved in the construction industry.
This book offers a mathematical foundation for modern cryptography. It is primarily intended as an introduction for graduate students. Readers should have basic knowledge of probability theory, but familiarity with computational complexity is not required. Starting from Shannon's classic result on secret key cryptography, fundamental topics of cryptography, such as secret key agreement, authentication, secret sharing, and secure computation, are covered. Particular attention is drawn to how correlated randomness can be used to construct cryptographic primitives. To evaluate the efficiency of such constructions, information-theoretic tools, such as smooth min/max entropies and information spectrum, are developed. The broad coverage means the book will also be useful to experts as well as students in cryptography as a reference for information-theoretic concepts and tools.