- Table View
- List View
The Psychology of Insider Risk: Detection, Investigation and Case Management
by Eric ShawClinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. After a career in counterterrorism, Dr. Shaw spent the last 20 years concentrating on insiders—employees who commit espionage, sabotage, intellectual property theft, present risks of harm to self and others, and other workplace risks, especially those influenced by mental health conditions. Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personal characteristics, resources and support that can mitigate these risks. Dr. Shaw also examines specific risk accelerators like subject disgruntlement, personality disorders and problematic organizational responses that can escalate the speed and intensity of insider risks. The investigative applications, strengths and weaknesses of the CPIR are also considered. This work also describes the behavioral science tools deployed in insider investigations, especially those designed to locate and understand persons at-risk and help organizations intervene to avoid escalation or manage potential damage. Case examples are drawn from intelligence community, corporate and law enforcement investigations. Specific insider cases where the use of behavioral science tools is described in detail include leaks, anonymous threats, erotomania, hacking, violence risk, mass destruction threats and espionage. The work closes with consideration of the many current and future challenges insider risk professionals face. These include the challenge of recognizing suicidal ideation as a gateway to other forms of insider risk, understanding when subject therapy will, and will not reduce risk, deciphering belief in conspiracy theory from significant extremist risk, appreciating insider threats to our elections and the unique challenges posed when the insider is a leader.
Psychology of the Digital Age
by John SulerBased on two decades of participant-observation field research in diverse online environments, this engaging book offers insights for improving lifestyles and enhancing wellbeing in the digital age. John R. Suler, a founder of the field of cyberpsychology, explains its fundamental principles across a wide variety of topics, including online identity management, disinhibition, communication via text and photographs, intimacy and misunderstandings in online relationships, conflicting attitudes toward social media, addiction, deviant behavior, virtual reality, artificial intelligence, and media overload. He provides a new framework, the 'Eight Dimensions of Cyberpsychology Architecture', which researchers, students, and general readers interested in cyberpsychology can apply as a valuable tool for creating and understanding different digital realms. Psychology of the Digital Age focuses on the individual, shedding new light on our conscious as well as subconscious reactions to online experiences and our intrinsic human need to self-actualize.
The Psychology of the Internet
by Patricia WallaceThis timely volume explores the psychological aspects of cyberspace, a virtual world in which people from around the globe are acting and interacting in many new, unusual, and occasionally alarming ways. Drawing on research in the social sciences, communications, business, and other fields, Patricia Wallace examines how the online environment can influence the way we behave, sometimes for the better, sometimes not. Our own online behavior then becomes part of the Internet's psychological environment for others, creating opportunities for shaping the way this new territory for human interaction is unfolding. Since the Internet--and our experience within it--is still young, we have a rare window of opportunity to influence the course of its development. With a new preface that incorporates many of the changes online and in the field since the hardcover edition was published, the paperback edition of The Psychology of the Internet includes the latest coverage of e-commerce, workplace surveillance and datamining, all areas of recent intense public concern. Patricia M. Wallace is Executive Director of the Center for Knowledge and Information Management at the Robert H. Smith School of Business, University of Maryland. She is author of an interactive psychology CD-ROM called PRISM and of the textbook Introduction to Psychology, Fourth Edition (with Jeffrey Goldstein). Dr. Wallace is also the principal investigator on grants from the Annenberg Projects/Corporation for Public Broadcasting dealing with language learning through CD-ROMs and the Internet.
The Psychology of the Selfie: What the Research Says
by Barrie GunterThe Psychology of the Selfie provides a comprehensive overview and analysis of research on the significance of selfies, offering insights into the topic from a psychological perspective and examining important issues such as body image, self-objectification, mental health and psychological benefits. Selfies are a worldwide phenomenon. Although dismissed by critics as a sign of self-absorbed narcissism, they are also a social currency that maintains and reinforces friendships, a feedback loop for self-identity affirmation, a promotional tool for gaining social influence, and a method for preserving memories of life events. In this book, Barrie Gunter expertly explores the psychological underpinnings of the contemporary global phenomenon of "selfies", from the historical roots and meteoric rise due to technical advancements, to the different personality types of selfie-takers, to social relationships, to group and personal identity. Looking at both the psychological nature and impact of selfies, this book reviews different psychological outcomes for selfie-takers, both positive and negative, and the growth in psychological and physical problems that can sometimes arise. Presenting a comprehensive analysis specifically of selfie behaviour, this book is an essential reference for students and researchers in communications and media, journalism, information studies, psychology and sociology, as well as anyone with a general interest in the phenomenon.
The Psychology of Totalitarianism
by Mattias DesmetThe world is in the grips of mass formation—a dangerous, collective type of hypnosis—as we bear witness to loneliness, free-floating anxiety, and fear giving way to censorship, loss of privacy, and surrendered freedoms. It is all spurred by a singular, focused crisis narrative that forbids dissident views and relies on destructive groupthink. Desmet’s work on mass formation theory was brought to the world’s attention on The Joe Rogan Experience and in major alternative news outlets around the globe. Read this book to get beyond the sound bites! Totalitarianism is not a coincidence and does not form in a vacuum. It arises from a collective psychosis that has followed a predictable script throughout history, its formation gaining strength and speed with each generation—from the Jacobins to the Nazis and Stalinists—as technology advances. Governments, mass media, and other mechanized forces use fear, loneliness, and isolation to demoralize populations and exert control, persuading large groups of people to act against their own interests, always with destructive results. In The Psychology of Totalitarianism, world-renowned Professor of Clinical Psychology Mattias Desmet deconstructs the societal conditions that allow this collective psychosis to take hold. By looking at our current situation and identifying the phenomenon of “mass formation”—a type of collective hypnosis—he clearly illustrates how close we are to surrendering to totalitarian regimes. With detailed analyses, examples, and results from years of research, Desmet lays out the steps that lead toward mass formation, including: An overall sense of loneliness and lack of social connections and bonds A lack of meaning—unsatisfying “bullsh*t jobs” that don’t offer purpose Free-floating anxiety and discontent that arise from loneliness and lack of meaning Manifestation of frustration and aggression from anxiety Emergence of a consistent narrative from government officials, mass media, etc., that exploits and channels frustration and anxiety In addition to clear psychological analysis—and building on Hannah Arendt’s essential work on totalitarianism, The Origins of Totalitarianism—Desmet offers a sharp critique of the cultural “groupthink” that existed prior to the pandemic and advanced during the COVID crisis. He cautions against the dangers of our current societal landscape, media consumption, and reliance on manipulative technologies and then offers simple solutions—both individual and collective—to prevent the willing sacrifice of our freedoms. “We can honor the right to freedom of expression and the right to self-determination without feeling threatened by each other,” Desmet writes. “But there is a point where we must stop losing ourselves in the crowd to experience meaning and connection. That is the point where the winter of totalitarianism gives way to a spring of life.” “Desmet has an . . . important take on everything that’s happening in the world right now.”—Aubrey Marcus, podcast host “[Desmet] is waking a lot of people up to the dangerous place we are now with a brilliant distillation of how we ended up here.”—Robert F. Kennedy, Jr.
A Psychology of User Experience: Involvement, Affect and Aesthetics (Human–Computer Interaction Series)
by Phil TurnerIt is well-established that while cognitive psychology provides a sound foundation for an understanding of our interactions with digital technology, this is no longer sufficient to make sense of how we use and experience the personal, relational and ubiquitous technologies that pervade everyday life. This book begins with a consideration of the nature of experience itself, and the user experience (UX) of digital technology in particular, offering a new, broader definition of the term. This is elaborated though a wide-ranging and rigorous review of what are argued to be the three core UX elements. These are involvement, including shared sense making, familiarity, appropriation and "being-with" technologies; affect, including emotions with and about technology, impressions, feelings and mood; and aesthetics, including embodied aesthetics and neuroaesthetics. Alongside this, new insights are introduced into how and why much of our current use of digital technology is simply idling, or killing time. A particular feature of the book is a thorough treatment of parallel, and sometimes competing, accounts from differing academic traditions. Overall, the discussion considers both foundational and more recent theoretical and applied perspectives from social psychology, evolutionary psychology, folk psychology, neuroaesthetics, neuropsychology, the philosophy of technology, design and the fine arts. This broad scope will be enlightening and stimulating for anyone concerned in understanding UX. A Psychology of User Experience stands as a companion text to the author's HCI Redux text which discusses the contemporary treatment of cognition in human-computer interaction.
A Psychology of User Experience: Involvement, Affect and Aesthetics (Human–Computer Interaction Series)
by Phil TurnerAs mainstream psychology was never intended for the HCI practitioner, this second edition of A Psychology of User Experience takes the opportunity to create a new chapter specifically written for practitioners, that is, UX-oriented psychology rather than the all-too familiar everyday variety. For example, we discuss our two modes of cognition (fast / slow or controlled / automatic); we underline the importance of familiarity; and how and why we check our phones every few seconds day or night. We also establish the ‘context for user experience’ noting that just about everyone uses a cell phone and very many own a smartphone too and have done so for years (so, how did they learn to use them?). User experience reflects the current vogue for “designing for experience” within HCI which we recognise as something we feel rather than have reasoned about. In the real world, our feelings tell us how we are doing but with UX, they tell us how we feel about using digital technology. Topics are introduced to UX which maybe unfamiliar such as virtual experiences and virtual emotions and the affect associated with the uncontrolled use of digital technology.A Psychology of User Experience stands as a companion text to the author’s HCI Redux text which discusses the contemporary treatment of cognition in human-computer interaction.
The Psychosocial Reality of Digital Travel: Being in Virtual Places
by Ingvar Tjostheim John A. WaterworthThis open access book takes a fresh look at the nature of the digital travel experience, at a time when more and more people are engaged in online social interaction, games, and other virtual experiences essentially involving online visits to other places. It examines whether these experiences can seem real to the virtual traveller and, if so, under what conditions and on what grounds. The book unpacks philosophical theories relevant to the feeling of being somewhere, emphasising the importance of perception and being-in-the-world. Notions of place are outlined, based on work in tourism studies, human geography, and other applied social fields, with an aim to investigate how and when different experiences of place arise for the traveller and how these relate to telepresence – the sense of being there in another place through digital media. Findings from recent empirical studies of digital travel are presented, including a survey from which the characteristics of “digital travellers” are identified. A review of selected interactive design trends and possibilities leads to the conclusion, which draws these strands together and looks to the future of this topical and expanding field.
PsyConversion: 101 Behavior Patterns für eine bessere User Experience und höhere Conversion-Rate im E-Commerce
by Philipp SpreerDieses Buch bietet 101 konkret anwendbare Behavior Patterns zur Verbesserung der User Experience und Conversion-Rate entlang der Customer Journey im E-Commerce. Der Autor erläutert, wie unser Gehirn zu Entscheidungen kommt, welche unbewussten Verhaltensmuster dabei verwendet werden und wie diese im Digital-Umfeld aktiviert werden können.Die Wissenschaft ist sich heute einig, dass unser Gehirn mit zwei Systemen arbeitet: einem emotional-intuitiven und einem rationalen Entscheidungssystem. Das rationale System wird im E-Commerce mit ausreichend Argumenten versorgt, es fällt aber nur rund 5% aller Entscheidungen! Die übrigen 95% des Kundengehirns werden bislang sträflich vernachlässigt. Dort werden Entscheidungen auf Basis tief verankerter, unbewusster Verhaltensmuster gefällt – der sogenannten „Behavior Patterns“.Diese Patterns sind so relevant, weil sie bei fast allen Menschen in allen Situationen wirken. Das macht sie für die Anwendung im E-Commerce so attraktiv. Das Wissen um Behavior Patterns ermöglicht es, das Online-Kundenverhalten endlich tiefgreifend zu verstehen und im Sinne einer besseren User Experience und höherer Conversion-Rates gezielt zu beeinflussen.Der Inhalt• Das sind Behavior Patterns und so lassen sie sich im Digital-Umfeld nutzen• So verbessern Sie die User Experience und Ihre Conversion-Rate• Bibliothek von 101 Behavior Patterns von der Awareness- bis zur Retention-Phase• Intuitive Frameworks zur Identifikation passender Behavior Patterns• Ethisch-moralische Grenzen des EinsatzesLeserstimmen„Macht signifikante Performance-Steigerungen möglich.“ Stephan Lein, Director Retail Google„Brilliantes Buch!” Dr. Thilo Pfrang, Founder & Managing Partner von Behavioral Science Consulting„Kommt garantiert auf meinen Schreibtisch!“ Dennis Esterl, Senior Customer Lifecycle Manager bei Amazon„Das perfekte Update für unser Online-Marketing.“ Dr. Matthias Wilken, Leiter Channelmanagement bei Allianz
Pthreads Programming: A POSIX Standard for Better Multiprocessing
by Dick Buttlar Jacqueline Farrell Bradford Nichols<p>POSIX threads, or pthreads, allow multiple tasks to run concurrently within the same program. This book discusses when to use threads and how to make them efficient. It features realistic examples, a look behind the scenes at the implementation and performance issues, and special topics such as DCE and real-time extensions.</p>
Pub Light: A Publisher's Introduction to Selling Your Book in 10 Easy Steps
by Elizabeth Turnbull Kaitlin AlbersPub Light provides a concise, comprehensive guide to assist authors in the daunting task of properly marketing their books. We've compiled the best tips and tricks in the industry from marketing experts, independent authors, and professional bloggers. In 10 easy steps, we reveal the best ways to leverage your audience, from utilizing social media, networking with people you know, getting your book reviewed, and more!
Pubblicare da soli il proprio libro sul mercato globale
by Jason Matthews Erica Roggio e Loredana MarmoraleHai scritto un libro? Vuoi vendere su Amazon, Apple, Google e altri importanti rivenditori? Risparmia tempo e denaro vendendo e-book online con questa semplice guida all'auto-pubblicazione. Risolvi i tuoi dubbi su come preparare il tuo libro per caricarlo sulle piattaforme dei principali rivenditori. Il manuale, che include consigli per far emergere il tuo libro rispetto a tanti altri, è stato scritto da Jason Matthews, esperto di auto-pubblicazione e autore di numerose opere letterarie di narrativa e saggistica. I suoi libri sono stati tradotti in 8 lingue e i suoi corsi video sono stati seguiti da studenti di oltre 123 paesi. Preparati a raggiungere velocemente gli obiettivi di pubblicazione. Imparerai a: •formattare il tuo libro per i principali rivenditori •convertirlo in ePub in modo che sia visualizzato correttamente su tablet, smartphone e Kindle •disegnare una copertina accattivante •vendere attraverso Amazon, Apple, Google Play, Barnes & Noble, Smashwords, Kobo e altre piattaforme •utilizzare i social media in maniera intelligente (Facebook, Twitter, Google Plus, YouTube) •bloggare e creare la tua piattaforma autore •ottenere recensioni, e tanto altro ancora. Trova soluzioni per le tue esigenze di modifica, copyright, ISBN e altri requisiti, oltre alle migliori opzioni e strategie per lavorare con i professionisti. I lettori di tutto il mondo sono affamati di nuovi libri. Sei pronto a condividere il tuo? Inizia oggi!
Public Branding and Marketing: A Global Viewpoint
by Staci M. ZavattaroThis edited volume details public branding and marketing from a global, comparative perspective. Place branding and marketing practices are now prominent in cities, states, nations, regions, and organizations all over the world. While disciplines such as hospitality management, tourism marketing, and business marketing have made inroads into understanding the intricacies of place branding, research in public administration and policy is still emerging. This volume fills that research gap. Including accounts from both the academic and practitioner communities, this book bridges the academic-practitioner divide and provides a holistic account of branding and marketing in public organizations as well as immediate application and lessons learned. The book takes an explicit public administration approach, focusing on a wide range of topics such as branding leadership, co-creation, stakeholder engagement, education, non-profit marketing and branding, and city administration. The book is divided into four sections. Section I highlights the process of developing and communicating public branding and marketing efforts. Section II focuses specifically on how social media and other digital technologies are used to communicate and evaluate place branding strategies. Section III centers on branding at the local government level. Section IV highlights how various stakeholder groups come together (or not) when participating in strategic branding efforts. Presenting various methodologies, approaches, and implications of place branding and marketing across differing social, cultural, political, and economic conditions, this book will be of use to scholars and students in public. administration, tourism studies, and business administration as well as professionals and practitioners in the public branding and marketing field.
Public Cloud Potential in an Enterprise Environment: Public Cloud as a New IT Platform to Increase Business Value
by André Bögelsack Niklas Feil Ramón Schulz Gabriel AbrantesThe transformation to the public cloud comes with many challenges. The book explains three phases that form the basis for determining a company's position in the transformation. Each stage outlines a maturity level of transformation. An assessment framework guides the reader through the analysis of cloud readiness to identify the current stage of the organization and to reach the next stage of realizing the value of the cloud. The framework is supplemented by practical examples.
Public Cloud Potenzial in einem Unternehmensumfeld: Public Cloud als neue IT-Plattform zur Steigerung des Geschäftswerts
by Niklas Feil André Bögelsack Ramón Schulz Gabriel AbrantesDie Transformation in die Public Cloud ist mit vielen Herausforderungen verbunden. Das Buch erläutert drei Phasen, die die Grundlage für die Ermittlung der Position eines Unternehmens in der Transformation bilden. Jede Stufe umreißt einen Reifegrad der Transformation. Ein Bewertungsrahmen führt den Leser durch die Analyse der Cloud-Readiness zur Identifikation der derzeitigen Stufe des Unternehmens und um die nächste Stufe zur Ausschöpfung des Mehrwerts der Cloud zu erreichen. Das Framework wird durch praxisnahe Beispiele ergänzt.Der Inhalt: Kombination eines mehrstufigen, ganzheitlichen FrameworksBewertung zur Ermittlung des Ausgangspunkts der Cloud-ReadinessÜberblick über die Reifegrade der Transformation mit PraxisbeispielenDie ZielgruppenIT-Entscheidungsträger von Unternehmen aus allen Branchen
Public Interests: Media Advocacy and Struggles over U.S. Television
by Allison PerlmanNearly as soon as television began to enter American homes in the late 1940s, social activists recognized that it was a powerful tool for shaping the nation's views. By targeting broadcast regulations and laws, both liberal and conservative activist groups have sought to influence what America sees on the small screen. Public Interests describes the impressive battles that these media activists fought and charts how they tried to change the face of American television. Allison Perlman looks behind the scenes to track the strategies employed by several key groups of media reformers, from civil rights organizations like the NAACP to conservative groups like the Parents Television Council. While some of these campaigns were designed to improve the representation of certain marginalized groups in television programming, as Perlman reveals, they all strove for more systemic reforms, from early efforts to create educational channels to more recent attempts to preserve a space for Spanish-language broadcasting. Public Interests fills in a key piece of the history of American social reform movements, revealing pressure groups' deep investments in influencing both television programming and broadcasting policy. Vividly illustrating the resilience, flexibility, and diversity of media activist campaigns from the 1950s onward, the book offers valuable lessons that can be applied to current battles over the airwaves.
Public Key Cryptography
by Lynn Margaret BattenComplete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. <P><P>It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based - such as the discrete logarithm problem and the difficulty of factoring integers. The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography: * Explains fundamentals of public key cryptography * Offers numerous examples and exercises * Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam * Provides solutions to the end-of-chapter problems Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.
Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9614)
by Chen-Mou Cheng Kai-Min Chung Giuseppe Persiano Bo-Yin YangThe two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016.The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.
Public-Key Cryptography – PKC 2018: 21st Iacr International Conference On Practice And Theory Of Public-key Cryptography, Rio De Janeiro, Brazil, March 25-29, 2018, Proceedings (Lecture Notes in Computer Science #10770)
by Michel Abdalla Ricardo DahabThe two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.
Public-Key Cryptography – PKC 2018: 21st Iacr International Conference On Practice And Theory Of Public-key Cryptography, Rio De Janeiro, Brazil, March 25-29, 2018, Proceedings (Lecture Notes in Computer Science #10770)
by Michel Abdalla Ricardo DahabThe two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.
Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11442)
by Dongdai Lin Kazue SakoThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11443)
by Dongdai Lin Kazue SakoThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11442)
by Dongdai Lin Kazue SakoThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12110)
by Aggelos Kiayias Markulf Kohlweiss Petros Wallden Vassilis ZikasThe two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.
Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12111)
by Vassilis Zikas Aggelos Kiayias Markulf Kohlweiss Petros WalldenThe two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.