You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.
"Shades of Love" is like a chest full of stories, poems and all the mesmerizing thoughts about love. Each writeup of the book delves into the harmonies of love. It tells us that love has diversely heavenly shades, between us and friends, between family members, between love partners, between us and God. It also shows us different sides of love, sometimes happy, sometimes sad, painful and pleasing. Here, each writeup acts as a doorway towards exploring love. Love, is more than just an imagination, love is bigger than the skies and the oceans, there is just so much of feelings in the four lettered word, "LOVE". Love is the only heavenly element, runs through one's veins, pumps through one's heart and flows through one's brain, emotions and thoughts. As you read this book, remember, love has its own unique shape, everytime.
Backbencher(A life Lesson) is a fascinating anthology of school life, co-written by 30 different voices. Through a back-bench lens, each page dives into the highs and lows of adolescence-friendships, catch- ups, academic struggles, and pressures to penetrate. The co-authors provide a vivid portrait of school life, celebrating the joys and challenges of growing up. Ultimately, Backbencher is a nostalgic tribute to the unforgettable memories that shape our youth.
This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory.
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
This book provides in-depth information on topics relating to anthropogenic carbon dioxide utilization processes. Presenting a collection of state-of-the-art scientific reviews and research perspectives on carbon management strategies of relevance to the energy industry, it features contributions by leading scientists and technocrats across 19 chapters as an Indian contribution In the energy industry, new processes for carbon dioxide removal and recycling are developing quickly, and it is in this context that the book provides an opportunity to review the current status of and promote efforts to achieve effective carbon capture and management. The contents presented here will prove useful to researchers, students, industry experts, scientists and policymakers alike.
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008. The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.
The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019. The 43 full papers presented were carefully reviewed and selected from 147 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.