Browse Results

Showing 46,076 through 46,100 of 61,729 results

Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11443)

by Dongdai Lin Kazue Sako

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​

Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12110)

by Vassilis Zikas Aggelos Kiayias Markulf Kohlweiss Petros Wallden

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12111)

by Vassilis Zikas Aggelos Kiayias Markulf Kohlweiss Petros Wallden

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12710)

by Juan A. Garay

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.

Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12711)

by Juan A. Garay

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.

Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I (Lecture Notes in Computer Science #13177)

by Junji Shikata Goichiro Hanaoka Yohei Watanabe

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II (Lecture Notes in Computer Science #13178)

by Junji Shikata Goichiro Hanaoka Yohei Watanabe

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (Lecture Notes in Computer Science #13940)

by Vladimir Kolesnikov Alexandra Boldyreva

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (Lecture Notes in Computer Science #13941)

by Vladimir Kolesnikov Alexandra Boldyreva

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14601)

by Vanessa Teague Qiang Tang

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14602)

by Vanessa Teague Qiang Tang

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14603)

by Vanessa Teague Qiang Tang

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part IV (Lecture Notes in Computer Science #14604)

by Vanessa Teague Qiang Tang

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part I (Lecture Notes in Computer Science #15674)

by Tibor Jager Jiaxin Pan

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15675)

by Tibor Jager Jiaxin Pan

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part III (Lecture Notes in Computer Science #15676)

by Tibor Jager Jiaxin Pan

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part IV (Lecture Notes in Computer Science #15677)

by Tibor Jager Jiaxin Pan

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part V (Lecture Notes in Computer Science #15678)

by Tibor Jager Jiaxin Pan

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025. The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.

Publishers, Readers, and Digital Engagement

by Marianne Martens

This book demonstrates how the roles of "author," "marketer," and "reviewer" are being redefined, as online environments enable new means for young adults to participate in the books they love. Prior to the expansion of digital technologies around reading, teachers, parents and librarians were the primary gatekeepers responsible for getting books into the hands of young people. Now publishers can create disintermediated digital enclosures in which they can communicate directly with their reading audience. This book exposes how teens contribute their immaterial and affective labor as they engage in participatory reading experiences via publishers' and authors' interactive websites and use of social media, and how in turn publishers are able to use such labor as they get invaluable market research, peer-to-peer recommendations, and even content which can be used in other projects -- all virtually free-of-charge.

Publishing E-Books For Dummies

by Ali Luke

Publish, market, and sell your own e-book Although creating an e-book seems fairly straightforward, it is not. You need to select and create a variety of formats that will be read on a variety of e-reader devices--and market and sell your book in a variety of ways. Before you take the plunge, get this practical guide. With clear instruction and sensible advice, it will help you navigate the often confusing, time-consuming, and costly world of self-publishing an e-book. The book gives you solid marketing tips for selling your e-book, including using blogging and social media and how to build an online platform. It also discusses key technologies you'll encounter, including Smashwords, iBooks Author, Amazon, Microsoft Word, Open Office, Calibre, WordPress, E-junkie, and others.Helps readers navigate the confusing, time-consuming, and often costly world of self-publishing an e-book Provides both technical how-tos as well solid marketing advice on how to sell your e-book using Facebook, Twitter, Goodreads, and other social media sites Covers essential technologies, such as Smashwords, iBooks Author, Amazon, Microsoft Word, Open Office, Calibre, WordPress, and E-junkie Explores e-book devices, including Kindle, Kobo, Sony Reader, Nook, iPad, and other tablets Delves into the nitty-gritty of e-book formats Before you self-publish your e-book, start first with Publishing eBooks For Dummies.

Publishing Python Packages: Test, share, and automate your projects

by Dane Hillard

Create masterful, maintainable Python packages! This book includes pro tips for design, automation, testing, deployment, and even release as an open source project!In Publishing Python Packages you will learn how to: Build extensions and console script commands Use tox to automate packaging, installing, and testing Build a continuous integration pipeline using GitHub Actions Improve code quality and reduce manual review using black, mypy, and flake8 Create published documentation for your packages Keep packages up to date with pyupgrade and Dependabot Foster an open source community using GitHub features Publishing Python Packages teaches you how to easily share your Python code with your team and the outside world. Learn a repeatable and highly automated process for package maintenance that&’s based on the best practices, tools, and standards of Python packaging. This book walks you through creating a complete package, including a C extension, and guides you all the way to publishing on the Python Package Index. Whether you&’re entirely new to Python packaging or looking for optimal ways to maintain and scale your packages, this fast-paced and engaging guide is for you. Foreword by David Beazley. About the technology Successful Python packages install easily, run flawlessly, and stay reliably up to date. Publishing perfect Python packages requires a rigorous process that supports systematic testing and review, along with excellent documentation. Fortunately, the Python ecosystem includes tools and techniques to automate package creation and publishing. About the book Publishing Python Packages presents a practical process for sharing Python code in an automated and scalable way. Get hands-on experience with the latest packaging tools, and learn the ins and outs of package testing and continuous integration. You&’ll even get pro tips for setting up a maintainable open source project, including licensing, documentation, and nurturing a community of contributors. What's inside Build extensions and console script commands Improve code quality with automated review and testing Create excellent documentation Keep packages up to date with pyupgrade and Dependabot About the reader For intermediate Python programmers. About the author Dane Hillard has spent the majority of his development career using Python to build web applications. Table of Contents PART 1 FOUNDATIONS 1 The what and why of Python packages 2 Preparing for package development 3 The anatomy of a minimal Python package PART 2 CREATING A VIABLE PACKAGE 4 Handling package dependencies, entry points, and extensions 5 Building and maintaining a test suite 6 Automating code quality tooling PART 3 GOING PUBLIC 7 Automating work through continuous integration 8 Authoring and maintaining documentation 9 Making a package evergreen 10 Scaling and solidifying your practices 11 Building a community

Publishing with iBooks Author: An Introduction to Creating Ebooks for the iPad

by Adam Witwer Nellie McKesson

iBooks Author is the first tool of its kind. Never before have publishers, authors, and content creators had a tool for making dynamic, interactive ebooks in a WYSIWYG environment. This book is intended to get you up and writing in iBooks Author. You’ll learn what to expect from this new tool and what its strengths and limitations are. You’ll see how you can create beautifully designed pages and how you can bring those designs to life with interactive content in ways that, before now, were only possible in a web browser on the Internet. You’ll also find out how to navigate the occasionally tricky terrain of Apple’s ecosystem so that you can get your book published to the iBookstore.

Pugtato Babysits the Snouts

by Zondervan

What do you get when you cross imaginative and loveable characters, enchanting and inspiring illustrations and a giggle-inducing story? ...Pugtato, a simple, good spud and a hilarious mashup of pet and vegetable characters by the inimitable illustrator Sophie Corrigan! Join Pugtato as he takes on the job of babysitting the Brussels Snouts.Pugtato thinks babysitting will be easy … how much trouble can baby Brussels Snouts get into? But as the day unfolds, the rambunctious little Snouts decide to show Pugtato they are not little babies, and prove that size doesn&’t matter when it comes to having lots of fun with your good spuddies.Pugtato Babysits the Snouts delivers:A delightful, giggle-inducing, rhyming, read-aloud story perfect for kids ages 4-8Imaginative, silly pet and vegetable mashups such as Pugtato, Tomatoad, Carrat, Cowbbage, Croccoli, Unicorn on the Cob and more!A beautiful, eye-catching cover, rich with color and embossed textureYoung children will learn invaluable lessons from Pugtato about:FriendshipAcceptanceResponsibilityCreativityYou&’ll also want to follow Pugtato&’s adventures in Pugtato, Let&’s Be Best Spuddies, Pugtato Finds a Thing, and Pugtato and Friends Audio Collection: 3 Books in 1.

Pugtato Finds a Thing

by Zondervan

What do you get when you cross imaginative and loveable characters, enchanting and inspiring illustrations and a giggle-inducing story? Pugtato, a simple, good spud and a hilarious mashup of pet and vegetable characters by the inimitable illustrator Sophie Corrigan! Join Pugtato and his cute and quirky spuddies in this heartwarming picture book that celebrates the power of friendship, compassion, and believing in your own unique gifts.When Pugtato&’s simple, quiet life is disrupted after he digs up a strange object in his garden, he enlists his best &“spuddies&” to help (they are more clever than he is, after all). Tweetroot is certain it&’s a new egg for her nest. Tomatoad is quite sure it&’s a toy just for him. And Purrsnip simply won&’t stop scratching it! Luckily, Pugtato has another very special spuddy to ask …Pugtato Finds a Thing delivers:A delightful, giggle-inducing, rhyming , read-aloud story perfect for kids ages 4-8Imaginative, silly pet and vegetable mashups such as Pugtato, Tomatoad, Carrat, Cowbbage, Croccoli, Unicorn on the Cob and more!A beautiful eye-catching cover rich with color Young children will learn invaluable lessons from Pugtato about:FriendshipCompassionAcceptanceCreativity You&’ll also want to follow Pugtato&’s adventures in Pugtato Babysits the Snouts, Pugtato, Let&’s Be Best Spuddies, and Pugtato and Friends Audio Collection: 3 Books in 1.

Pull

by David Siegel

The first clear guide to the Semantic Web and its upcoming impact on the business world Imagine that, in 1992, someone handed you a book about the future of something called the World Wide Web. This book claimed that through a piece of software called a "browser", which accesses "web sites", the world economy and our daily lives would change forever. Would you have believed even 10 percent of that book? Did you take advantage of the first Internet wave and get ahead of the curve? Pull is the blueprint to the next disruptive wave. Some call it Web 3.0; others call it the semantic web. It's a fundamental transition from pushing information to pulling, using a new way of thinking and collaborating online. Using the principles of this book, you will slash 5-20 percent off your bottom line, make your customers happier, accelerate your industry, and prepare your company for the twenty-first century. It isn't going to be easy, and you don't have any choice. By 2015, your company will be more agile and your processes more flexible than you ever thought possible. The semantic web leads to possibilities straight from science fiction, such as buildings that can order their own supplies, eliminating the IRS, and lawyers finally making sense. But it also leads to major changes in every field, from shipping and retail distribution to health care and financial reporting. Through clear examples, case studies, principles, and scenarios, business strategist David Siegel takes you on a tour of this new world. You'll learn: -Which industries are already ahead. -Which industries are already dead. -How to make the power shift from pushing to pulling information. -How software, hardware, media, and marketing will all change. -How to plan your own strategy for embracing the semantic web. We are at the beginning of a new technology curve that will affect all areas of business. Right now, you have a choice. You can decide to start preparing for the exciting opportunities that lay ahead or you can leave this book on the shelf and get left in the dust like last time.

Refine Search

Showing 46,076 through 46,100 of 61,729 results