You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.
This Special Issue of Arts investigates the use of digital methods in the study of art markets and their histories. As historical and contemporary data is rapidly becoming more available, and digital technologies are becoming integral to research in the humanities and social sciences, we sought to bring together contributions that reflect on the different strategies that art market scholars employ to navigate and negotiate digital techniques and resources. The essays in this issue cover a wide range of topics and research questions. Taken together, the essays offer a reflection on what takes to research art markets, which includes addressing difficult topics such as the nature of the research questions and the data available to us, and the conceptual aspects of art markets, in order to define and operationalize variables and to interpret visual and statistical patterns for scholarship. In our view, this discussion is enriched when also taking into account how to use shared or interoperable ontologies and vocabularies to define concepts and relationships that facilitate the use and exchange of linked (open) data for cultural heritage and historical research.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
In the summer of 1991 the Department of Mathematics and Statistics of the Universite de Montreal was fortunate to host the NATO Advanced Study Institute "Algebras and Orders" as its 30th Seminaire de mathematiques superieures (SMS), a summer school with a long tradition and well-established reputation. This book contains the contributions of the invited speakers. Universal algebra- which established itself only in the 1930's- grew from traditional algebra (e.g., groups, modules, rings and lattices) and logic (e.g., propositional calculus, model theory and the theory of relations). It started by extending results from these fields but by now it is a well-established and dynamic discipline in ...
Throughout history, human life has been seriously threatened by bacterial infectious diseases. After the discovery of antibiotics, humanity thought it had won the fight against infectious bacteria. However, considering the rapid evolution of bacterial multidrug resistance and exhausted pipeline of antibiotics for fighting bacterial infectious diseases, we are approaching the ‘post-antibiotic’ era. Unlike eukaryote, bacteria are proficient in exchanging their genetic materials with others by means of horizontal gene transfer (HGT). As a vehicle for antibiotic resistance gene (ARG), plasmid is self-replicable and transferable in a wide range of host bacteria. Moreover, ways of HGT-mediated...
This volume aims to merge theoretical models with methodological approaches on ceramic technology and artisanal networks in the Classical world. This convergence of analytical frameworks allowed scholars to explore some traditional archaeological topics that usually have a very low-level of visibility, such as the skillful gestures of the craftspeople involved, the organization of the ceramic production, the dynamics of apprenticeship and knowledge transfer as well as intra and inter-regional artisanal mobility, in the Graeco-Roman ‘communities of practice’. The papers promote interdisciplinary dialogues among various fields of study, such as archaeology, archaeometry, anthropology, ethnoarchaeology, experimental archaeology, and digital humanities - such as Social Network Analysis, computational imaging, and big data analysis.