You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
This book is a printed edition of the Special Issue "Surface Chemistry and Catalysis" that was published in Catalysts
This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2010, CT-RSA 2010, held in San Francisco, CA, USA in April 2010. The 25 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on public-key cryptography, side-channel attacks, cryptographic protocols, cryptanalysis, and symmetric cryptography.
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.
This book constitutes the refereed proceedings of the Second SKLOIS Conference on Information Security and Cryptology, Inscrypt 2006, held in Beijing, China in November/December 2006. The 23 revised full papers cover digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
This book addresses the making and transforming of regions and territorial organisation, which are significant activities for policy makers and planners. It focuses on the regional, intermediate scale and gathers contributions by researchers from various European universities, especially at a time when there is a renewed interest for regions, regionalisation and regional planning. The different chapters in this edited volume deliver insightful theoretical approaches and documented empirical case studies. The recent reform that redrew and reorganized regions in France is of particular interest. Other contributions enrich the reflection about territorial reforms and changes by analysing situations in Italy, Poland, United Kingdom – notably the issue of planning city-regions or metropolitan areas. This volume provides a comparative view of the impact of territorial reforms on planning policies and explores the evolution of regional settings in Europe. It also confirms region as a fundamental scale and an essential instrument to organise and develop societies and territories. The chapters in this book were originally published in the journal European Planning Studies.
'LEON was the first restaurant on the high street to pay attention to a new way of eating - championing gluten-, dairy- and sugar-free food. We've always done it. It's always done us and our customers good. Now it's time to stop it being a secret.' - John Vincent, LEON co-founder Each recipe in this beautiful cookbook is completely gluten-, dairy- and refined sugar-free, with many following a 'paleon' formula (LEON's version of Paleo). From recipes for gluten-free Spaghetti Vongole to chocolate beetroot cake, breakfast dahl to chicken and olive tagine, this book contains recipes for every meal of the day and every occasion, and proves that a free-from menu can be utterly delicious. ** Newly revised and improved ebook edition, optimized for both small- and large-screen devices **
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.