You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.
This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.
This book provides information on synthesis, properties, and applications of carbon nanomaterials. With novel materials, such as graphene (atomically flat carbon) or carbon onions (carbon nanospheres), the family of carbon nanomaterials is rapidly growing. This book provides a state-of-the-art overview and in-depth analysis of the most important carbon nanomaterials. Each chapter is written by a leading expert in the field which ensures that both, a review on the subject along with emerging perspectives are provided to the reader.
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
Diagnostics and Gene Therapy for Human Genetic Disorders provides an integrative and comprehensive source of information blending classical human genetics with the human genome. It provides a multidisciplinary overview of Mendelian inheritance and multifactorial inheritance, genetic variations, polymorphisms, chromosomal, multifactorial, and mitochondrial disorders. PCR, electrophoresis, cytogenetics, prenatal, and HPLC based techniques applied for diagnosing genetic disorders are discussed with applications. Symptoms, etiology, diagnosis, treatment of 14 major and 5 minor genetic disorders are discussed in detail. Methods employed for the preparation of kits for the diagnosis of diseases ar...
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
The objective of this Genetic Polymorphisms book is to rehighlight and provide few updates on the role of genetic polymorphisms in medicine and agriculture, which void emerging opinion on "full death" of genetic polymorphisms as useful genetic markers. Chapters presented here demonstrate the future benefit of SNPs in many genetic studies as well as prognosis disease and diagnosis.