You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The series Topics in Current Chemistry Collections presents critical reviews from the journal Topics in Current Chemistry organized in topical volumes. The scope of coverage is all areas of chemical science including the interfaces with related disciplines such as biology, medicine and materials science. The goal of each thematic volume is to give the non-specialist reader, whether in academia or industry, a comprehensive insight into an area where new research is emerging which is of interest to a larger scientific audience. Each review within the volume critically surveys one aspect of that topic and places it within the context of the volume as a whole. The most significant developments of the last 5 to 10 years are presented using selected examples to illustrate the principles discussed. The coverage is not intended to be an exhaustive summary of the field or include large quantities of data, but should rather be conceptual, concentrating on the methodological thinking that will allow the non-specialist reader to understand the information presented. Contributions also offer an outlook on potential future developments in the field.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.
This book empirically examines health care financing reforms and popular responses in three major cities in East Asia: Shanghai, Singapore, and Hong Kong. It adopts a new revised version of the theory of historical institutionalism to compare and explain the divergent reform paths in these three places over the past three decades. It also examines forces that propel institutional change. The book provides three detailed case studies on the development of health care financing reforms and the politics of implementing them. It shows that health care systems in Shanghai, Singapore, and Hong Kong were the products of Western presence in the nineteenth century. It illustrates how greater attentio...
The use of natural catalysts -enzymes -for the transformation of non-natural man-made organic compounds is not at all new: they have been used for more than one hundred years, employed either as whole cells, cell organelles or isolated enzymes [1, 2]. Certainly, the object of most of the early research was totally different from that of the present day. Thus the elucidation of biochemical pathways and enzyme mechanisms was the main reason for research some decades ago. It was mainly during the 1980s that the enormous potential of applying natural catalysts to transform non-natural organic compounds was recognized. What started as a trend in the late 1970s could almost be called a fashion in ...
Vols. for 1963- include as pt. 2 of the Jan. issue: Medical subject headings.