Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

First Person
  • Language: en
  • Pages: 244

First Person

An astonishingly frank self-portrait by Russia's president

Stabilization, Safety, and Security of Distributed Systems
  • Language: en
  • Pages: 403

Stabilization, Safety, and Security of Distributed Systems

  • Type: Book
  • -
  • Published: 2013-10-17
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed proceedings of the 15 International Symposium on Stabilization, Safety and Security of Distributed Systems, SSS 2013, held in Osaka, Japan, in November 2013. The 23 regular papers and 12 short papers presented were carefully reviewed and selected from 68 submissions. The Symposium is organized in several tracks, reflecting topics to self-* properties. The tracks are self-stabilization, fault tolerance and dependability; formal methods and distributed systems; ad-hoc, sensors, mobile agents and robot networks and P2P, social, self-organizing, autonomic and opportunistic networks.

Applied Cryptography and Network Security
  • Language: en
  • Pages: 698

Applied Cryptography and Network Security

  • Type: Book
  • -
  • Published: 2016-01-09
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

After Violence
  • Language: en
  • Pages: 601

After Violence

"Starting on September 1, 2004, and ending 53 hours later, Russia experienced its most appalling act of terrorism in history, the seizure of School No. 1 in Beslan, North Ossetia. Approximately 1,200 children, parents, and teachers were taken hostage, and over 330 -nearly one of every hundred Beslan residents- were killed, hundreds more seriously wounded, and all severely traumatized. After Violence is the first book to analyze the aftermath of such large-scale violence with evidence from almost all direct victims. It explores the motivations behind individual responses to violence. When does violence fuel greater acceptance of retaliatory violence, and when does violence fuel nonviolent par...

Cryptology and Network Security
  • Language: en
  • Pages: 594

Cryptology and Network Security

This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA. The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.

Public-Key Cryptography – PKC 2023
  • Language: en
  • Pages: 812

Public-Key Cryptography – PKC 2023

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA. The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Translations from Kommunist
  • Language: en
  • Pages: 476

Translations from Kommunist

  • Type: Book
  • -
  • Published: 1969
  • -
  • Publisher: Unknown

None

Financial Cryptography and Data Security
  • Language: en
  • Pages: 327

Financial Cryptography and Data Security

  • Type: Book
  • -
  • Published: 2006-10-11
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.

Advances in Cryptology – ASIACRYPT 2005
  • Language: en
  • Pages: 715

Advances in Cryptology – ASIACRYPT 2005

This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2005, held in Chennai, India in December 2005. The 37 revised full papers presented were carefully reviewed and selected from 237 submissions. The papers are organized in topical sections on algebra and number theory, multiparty computation, zero knowledge and secret sharing, information and quantum theory, privacy and anonymity, cryptanalytic techniques, stream cipher cryptanalysis, block ciphers and hash functions, bilinear maps, key agreement, provable security, and digital signatures.

Theory of Cryptography
  • Language: en
  • Pages: 622

Theory of Cryptography

  • Type: Book
  • -
  • Published: 2006-03-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in March 2006. The 31 revised full papers presented were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on zero-knowledge, primitives, assumptions and models, the bounded-retrieval model, privacy, secret sharing and multi-party computation, universally-composible security, one-way functions and friends, and pseudo-random functions and encryption.