Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Growing Information: Part I
  • Language: en
  • Pages: 478

Growing Information: Part I

None

Nanomaterials and multimodal tumor therapy
  • Language: en
  • Pages: 452

Nanomaterials and multimodal tumor therapy

None

The Party Family
  • Language: en
  • Pages: 333

The Party Family

The Party Family explores the formation and consolidation of the state in revolutionary China through the crucial role that social ties—specifically family ties—played in the state's capacity to respond to crisis before and after the foundation of the People's Republic of China. Central to these ties, Kimberley Ens Manning finds, were women as both the subjects and leaders of reform. Drawing on interviews with 163 participants in the provinces of Henan and Jiangsu, as well as government documents and elite memoirs, biographies, speeches, and reports, Manning offers a new theoretical lens—attachment politics—to underscore how family and ideology intertwined to create an important building block of state capacity and governance. As The Party Family details, infant mortality in China dropped by more than half within a decade of the PRC's foundation, a policy achievement produced to a large extent through the personal and family ties of the maternalist policy coalition that led the reform movement. However, these achievements were undermined or reversed in the complex policy struggles over the family during Mao's Great Leap Forward (1958–60).

Provable Security
  • Language: en
  • Pages: 385

Provable Security

This book constitutes the refereed proceedings of the 13th International Conference on Provable Security, ProvSec 2019, held in Cairns, QLD, Australia, in October 2019. The 18 full and 6 short papers presented were carefully reviewed and selected from 51 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives, including a special theme on “Practical Security.”

Communications and Networking
  • Language: en
  • Pages: 600

Communications and Networking

  • Type: Book
  • -
  • Published: 2017-09-30
  • -
  • Publisher: Springer

The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016. The total of 107 contributions presented in these volumes are carefully reviewed and selected from 181 submissions. The book is organized in topical sections on MAC schemes, traffic algorithms and routing algorithms, security, coding schemes, relay systems, optical systems and networks, signal detection and estimation, energy harvesting systems, resource allocation schemes, network architecture and SDM, heterogeneous networks, IoT (Internet of Things), hardware design and implementation, mobility management, SDN and clouds, navigation, tracking and localization, future mobile networks.

New Directions of Modern Cryptography
  • Language: en
  • Pages: 392

New Directions of Modern Cryptography

  • Type: Book
  • -
  • Published: 2012-12-06
  • -
  • Publisher: CRC Press

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents

Information and Communications Security
  • Language: en
  • Pages: 521

Information and Communications Security

  • Type: Book
  • -
  • Published: 2007-11-17
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The papers presented were carefully reviewed and selected. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Education and Social Factors
  • Language: en
  • Pages: 377
Trusted Computing and Information Security
  • Language: en
  • Pages: 423

Trusted Computing and Information Security

  • Type: Book
  • -
  • Published: 2017-11-22
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Advances in Cryptology -- ASIACRYPT 2013
  • Language: en
  • Pages: 562

Advances in Cryptology -- ASIACRYPT 2013

  • Type: Book
  • -
  • Published: 2013-11-23
  • -
  • Publisher: Springer

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.