You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This collection explores the notion of reframing as a framework for better understanding the multi-agent and multi-level nature of the translation process, generating new conversations in current debates on translational agency, authority, and power. The volume puts forward reframing as an alternative metaphor to traditional conceptualizations and descriptions of translation, which often position the process in such terms as transformation, reproduction, transposition, and transfer. Chapters in the book reflect on the translator figure as a central agent in actively moving a translated text to a new context, and the translation process as shaped by different forces and subjectivities when tr...
This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The 33 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems.
This book constitutes the refereed proceedings of the Second Theory of Cryptography Conference, TCC 2005, held in Cambridge, MA, USA in February 2005. The 32 revised full papers presented were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on hardness amplification and error correction, graphs and groups, simulation and secure computation, security of encryption, steganography and zero knowledge, secure computation, quantum cryptography and universal composability, cryptographic primitives and security, encryption and signatures, and information theoretic cryptography.
The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communication of Korea.
This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Security in Communication Networks, SCN 2002, held in Amalfi, Italy in September 2002. The 24 revised full papers presented together with two invited papers were carefully selected from 90 submissions during two rounds of reviewing and revision. The papers are organized in topical sections on forward security, foundations of cryptography, key management, cryptanalysis, systems security, digital signature schemes, zero knowledge, and information theory and secret sharing.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2003, CT-RSA 2003, held in San Francisco, CA, USA, in April 2003. The 26 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on key self-protection, message authentication, digital signatures, pairing based cryptography, multivariate and lattice problems, cryptographic architectures, new RSA-based cryptosystems, chosen-ciphertext security, broadcast encryption and PRF sharing, authentication structures, elliptic curves and pairings, threshold cryptography, and implementation issues.
This book constitutes the thoroughly refereed postproceedings of the 4th International Conference on Security in Communication Networks, SCN 2004, held in Amalfi, Italy in September 2004. The 25 revised full papers presented together with an invited paper were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on reduction of security and primitives, digital signature schemes, anonymity and privacy, authentication and identification, zero knowledge, public key cryptosystems, distributed cryptography, cryptanalysis of public key crypto systems, cryptanalysis, email security, and key distribution and feedback shift registers.
This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2004, held in Interlaken, Switzerland in May 2004. The 36 revised full papers presented were carefully reviewed and selected from 206 submissions. The papers are organized in topical sections on private computation, signatures, inconditional security, distributed cryptography, foundations, identity based encryption, elliptic curves, public-key cryptography, multiparty computation, cryptanalysis, new applications, algorithms and implementation, and anonymity.
The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this series is increasing every year. The number of papers submitted to INDOCRYPT 2004 was 181, out of which 147 papers conformed to the speci?cations in the call for papers and, therefore, were accepted to the review process. Those 147 submissions were spread over 22 countries. Only 30 papers were accepted to this proceedings. We should note that many of the papers that were not accepted were of good quality but only the top 30 papers were accepted. Each submission received at least three independent - views. The selection process also included a Web-based discussion phase....
This book presents a collection of 38 position and research papers surveying the future landscape of research in distributed computing, written by the participants of the Workshop on Future Directions in Distributed Computing, held in Bertinoro, Italy in June 2002. The papers are grouped into four topical sections. The first deals with foundations of distributed computing. The second section surveys research issues in novel communication and network services. The third section is about data, file services, coherence, and replication in network computing. The last section deals with system and application issues. The book also includes two papers presenting insights into technological and social processes that are part of the development of the distributed computing technology. All in all, the book contains a plethora of research topics that are targets of future research or that are already being addressed by forward-looking research in distributed computing. The book was written to be a source of inspiration for researchers and a source of motivation for graduate students interested in entering the exciting research field of distributed computing.