You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.
This biography of the court scholar Xun Xu explores central areas of intellectual life in third-century China — court lyrics, music, metrology, pitch systems, archeology, and historiography. It clarifies the relevant source texts in order to reveal fierce debates. Besides solving technical puzzles about the material details of court rites, the book unfolds factional struggles that developed into scholarly ones. Xun’s opponents were major figures like Zhang Hua and Zhi Yu. Xun Xu’s overall approach to antiquity and the derivation of truth made appeals to an idealized Zhou for authority. Ultimately, Xun’s precision and methods cost him both reputation and court status. The events mark a turning point in which ideals were moving away from such court constructs toward a relatively more philosophical antiquarianism and towards new terms and genres of self-expression.
Here rendered into English for the first time, these chapters provide important insights into the worlds of palace women and court politics, while revealing much about the lives of upper-class women in general at the close of the third century."--BOOK JACKET.
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
This set of six volumes provides a systematic and standardized description of 23,033 chemical components isolated from 6,926 medicinal plants, collected from 5,535 books/articles published in Chinese and international journals. A chemical structure with stereo-chemistry bonds is provided for each chemical component, in addition to conventional information, such as Chinese and English names, physical and chemical properties. It includes a name list of medicinal plants from which the chemical component was isolated. Furthermore, abundant pharmacological data for nearly 8,000 chemical components are presented, including experimental method, experimental animal, cell type, quantitative data, as well as control compound data. The seven indexes allow for complete cross-indexing. Regardless whether one searches for the molecular formula of a compound, the pharmacological activity of a compound, or the English name of a plant, the information in the book can be retrieved in multiple ways.
Hong Kong cinema began attracting international attention in the 1980s. By the early 1990s, Hong Kong had become "Hollywood East" as its film industry rose to first in the world in per capita production, was ranked second to the United States in the number of films it exported, and stood third in the world in the number of films produced per year behind the United States and India. This second edition of Historical Dictionary of Hong Kong Cinema contains a chronology, an introduction, and an extensive bibliography. The dictionary section has over 600 cross-referenced entries on directors, producers, writers, actors, films, film companies, genres, and terminology. This book is an excellent resource for students, researchers, and anyone wanting to know more about Hong Kong cinema.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.
The safe and secure operation ofcomputer systems continues to be the major issue in many applications where there is a threat to people, the environment, investment or goodwill. Such applications include medical devices, railway signalling, energy distribution, vehicle control and monitoring, air traffic control, industrial process control, telecommunications systemsand manyothers. This book represents the proceedings of the 16th International Conference on Computer Safety, Reliability and Security, held in York, UK, 7-10 September 1997. The conference reviews the state ofthe art, experience and new trends in the areas of computer safety, reliability and security. It forms a platform for tec...
The Cryptographers’ Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers’ Track, and it is now an established venue for presenting practical research results related to cryptography and data security. The conference received 77 submissions, and the program committee sel- ted 28 of these for presentation. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryp- graphy. Each paper was reviewed by at least three program committee members. Extended abstracts of the revised versions of these papers are in these proc- dings. The program also included two invited lectures by Dan Boneh and Silvio Micali. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection. Many of them attended the program committee meeting during the Crypto 2003 conference at the University of California, Santa Barbara.
This text explains the significance of Zhu Xi's interpretation of the Confucian tradition and of the genre of commentary in Eastern philosophy.