Browse Results

Showing 46,826 through 46,850 of 59,407 results

Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12711)

by Juan A. Garay

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.

Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12710)

by Juan A. Garay

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.

Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part I (Lecture Notes in Computer Science #13177)

by Goichiro Hanaoka Junji Shikata Yohei Watanabe

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Public-Key Cryptography – PKC 2022: 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8–11, 2022, Proceedings, Part II (Lecture Notes in Computer Science #13178)

by Goichiro Hanaoka Junji Shikata Yohei Watanabe

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (Lecture Notes in Computer Science #13941)

by Alexandra Boldyreva Vladimir Kolesnikov

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I (Lecture Notes in Computer Science #13940)

by Alexandra Boldyreva Vladimir Kolesnikov

The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14603)

by Qiang Tang Vanessa Teague

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part IV (Lecture Notes in Computer Science #14604)

by Qiang Tang Vanessa Teague

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14602)

by Qiang Tang Vanessa Teague

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography – PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14601)

by Qiang Tang Vanessa Teague

The four-volume proceedings set LNCS 14601-14604 constitutes the refereed proceedings of the 27th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2024, held in Sydney, NSW, Australia, April 15–17, 2024. The 54 papers included in these proceedings were carefully reviewed and selected from 176 submissions. They focus on all aspects of signatures; attacks; commitments; multiparty computation; zero knowledge proofs; theoretical foundations; isogenies and applications; lattices and applications; Diffie Hellman and applications; encryption; homomorphic encryption; and implementation.

Public-Key Cryptography - PKC 2016

by Bo-Yin Yang Giuseppe Persiano Kai-Min Chung Chen-Mou Cheng

Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016. The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named: CCA security,functional encryption, identity-based encryption, signatures, cryptanalysis,leakage-resilient and circularly secure encryption, protocols, and primitives.

Public Key Cryptosystems (Cyber Shorts)

by Esra Bas

This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary background, Chapters 1 and 2 are devoted to the selected fundamental concepts in cryptography mathematics and selected fundamental concepts in cryptography.Chapter 3 is devoted to discrete logarithm problem (DLP), DLP-related public key cryptosystems, digital signature algorithms, and their cryptanalysis. In this chapter, the elliptic curve counterparts of the algorithms and the basic algorithms for the solution of DLP are also given. In Chapter 4, RSA public key cryptosystem, RSA digital signature algorithm, the basic cryptanalysis approaches, and the integer factorization methods are provided. Chapter 5 is devoted to GGH and NTRU public key cryptosystems, GGH and NTRU digital signature algorithms, and the basic cryptanalysis approaches, whereas Chapter 6 covers other topics including knapsack cryptosystems, identity-based public key cryptosystems, identity-based digital signature algorithms, Goldwasser-Micali probabilistic public key cryptosystem, and their cryptanalysis.The book’s distinctive features: The book provides some fundamental mathematical and conceptual preliminaries required to understand the core parts of the book. The book comprises the selected public key cryptosystems, digital signature algorithms, and the basic cryptanalysis approaches for these cryptosystems and algorithms. The cryptographic algorithms and most of the solutions of the examples are provided in a structured table format to support easy learning. The concepts and algorithms are illustrated with examples, some of which are revisited multiple times to present alternative approaches. The details of the topics covered in the book are intentionally not presented; however, several references are provided at the end of each chapter so that the reader can read those references for more details.

Public Key Infrastructure: Building Trusted Applications and Web Services

by John R. Vacca

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act

Public Library Collection Development in the Information Age

by Annabel Stephens

Public Library Collection Development in the Information Age discusses the increasing amounts of information that are used in collection development. Case studies, interviews, and research are the basis for this book's suggestions to improve your collection methods without straining your library's budget. It will help you acquire the most useful materials while sharing information with collaborating libraries to offer patrons the latest and largest variety of resources.Discussing a topic that is scarcely addressed in collection literature, this book explores ways in which one informational medium - the Internet - impacts materials budgets, selection tools, and alternative sources of information during the selection process.Offering methods that apply to libraries of different sizes and financial capability, Public Library Collection Development in the Information Age provides you with ideas and suggestions for the improvement of collection development methods, including: examining how libraries use information to plan and budget for collection development developing a budget method that takes several factors into consideration, such as population impact, property tax revenues, circulation, reference needs, and client needs centralizing selections in order to allocate additional staff time and to choose resources patrons want without sacrificing the utility of local collections building public library collections with the assistance of vendors and the five levels of vendor participation using the conspectus method to assess and organize the collections of small libraries for easier access researching three public libraries in the United Kingdom to determine how varying levels of automation affect patron resources and services To help you integrate the appropriate electronic resources into collection development policies and procedures, Public Library Collection Development in the Information Age discusses which formats, access methods, pricing schemes, and differences in scope will best meet your selection needs. Containing proven strategies that will target your collection priorities and criteria to evaluate the use and effectiveness of electronic resources, this book will help revise your collection development methods to satisfy the informational needs of patrons.

The Public Library in the Bibliographic Network (Routledge Library Editions: Library and Information Science #69)

by Betty Turock

This book, first published in 1986, focuses on valuable information to all public library professionals who have questions about their participation in bibliographic networks. Contributors provide insights into both the benefits and the costs of networking by libraries of varying sizes and geographic locations. The actual uses of networks, their costs (including initial and ongoing expenses), and staffing needs are clearly explained.

Public Opinion and Counter-Terrorism: Security and Politics in the UK (Routledge Critical Terrorism Studies)

by Michael Lister

This book examines the ways in which the views of the public inhabit the counter-terrorism policy space, with a focus on the UK case. Drawing insights from Critical Terrorism Studies, Critical Security Studies and studies of public opinion, the book develops an argument that the relationship between public opinion is complex, iterative and mutually instantiating. Rather than public opinion and counter-terrorism policy existing in a simple, uni-directional causal relationship, the book argues that whilst counter-terrorism policy actors are informed by public opinion, in important ways they also construct that very opinion. This argument is made through an empirical analysis of UK counter-terrorism policy. Drawing on primary research interviews with key counter-terrorism policy actors, and security professionals, as well as original analysis of parliamentary debates, the book demonstrates that rather than UK counter- terrorism politics being closed and elite-driven, there exists a complex, dialectical relationship between public opinion and both the making and the implementing of counter-terrorism policy. This book will be of much interest to students of critical terrorism studies, counter-terrorism, security studies, British politics and communication studies.

Public Opinion, Campaign Politics & Media Audiences: New Australian Perspectives

by Bridget Griffen-Foley Associate Professor Sean Scalmer

This timely book investigates the fascinating landscape of media-driven politics through the prisms of 'public opinion', political campaigning, and audiences.From Indigenous voting rights and climate change to talkback radio and right-wing populism, Public Opinion, Campaign Politics & Media Audiences showcases new research in political science, history and media studies. Contributors scrutinise the relationship between polls, party policy and voting behaviour, and evaluate the roles of oratory and the media in electioneering and political communication across Australia, Britain and the United States.The eight chapters are based on papers delivered at a symposium to honour Murray Goot FASSA, Emeritus Professor of Politics and International Relations, on his retirement from Macquarie University.

Public Policy Analytics: Code and Context for Data Science in Government (Chapman & Hall/CRC Data Science Series)

by Ken Steif

Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R. Each of the eight chapters provides a detailed case study, showing readers: how to develop exploratory indicators; understand ‘spatial process’ and develop spatial analytics; how to develop ‘useful’ predictive analytics; how to convey these outputs to non-technical decision-makers through the medium of data visualization; and why, ultimately, data science and ‘Planning’ are one and the same. A graduate-level introduction to data science, this book will appeal to researchers and data scientists at the intersection of data analytics and public policy, as well as readers who wish to understand how algorithms will affect the future of government.

Public Relations and the Rise of AI

by Regina Luttrell Adrienne A. Wallace

This book explores the potential of artificial intelligence (AI) to transform public relations (PR) and offers guidance on maintaining authenticity in this new era of communication.One of the main challenges PR educators, researchers, and practitioners face in the AI era is the potential for miscommunication or unintended consequences of using AI tools. This volume provides insights on how to mitigate these risks and ensure that PR strategies are aligned, offering practical guidance on maintaining trust and authenticity in PR practices. Readers will learn to leverage AI for enhanced communication strategies and real-time audience engagement while navigating the ethical and legal implications of AI in PR. Featuring contributions from leading scholars, the book includes case studies and examples of AI-driven PR practices, showcasing innovative approaches and lessons from well-known brands. It offers a global perspective on AI’s impact on PR, with insights for practitioners and scholars worldwide.This book equips public relations educators, researchers, and professionals with the knowledge and tools they need in the changing landscape of communication in the age of AI.

Public Response to Alerts and Warnings on Mobile Devices: Summary of a Workshop on Current Knowledge and Research Gaps

by National Research Council of the National Academies

This book presents a summary of the Workshop on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Gaps, held April 13 and 14, 2010, in Washington, D.C., under the auspices of the National Research Council's Committee on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Needs. The workshop was structured to gather inputs and insights from social science researchers, technologists, emergency management professionals, and other experts knowledgeable about how the public responds to alerts and warnings, focusing specifically on how the public responds to mobile alerting.

Public Sector Transformation through E-Government: Experiences from Europe and North America (Routledge Studies in Innovation, Organizations and Technology)

by Christopher G. Reddick Vishanth Weerakkody

Over the last decade governments in Europe and North America have attempted to improve efficiency of public services through Information and Communication Technology, commonly branded as electronic government (e-government). Public Sector Transformation through E-Government explores the influence that e-government has on public sector organizations, the organizational complexities that result, and its impact on citizens and democratic society. This book examines e-government’s potential to transform public services from a theoretical perspective, and provides practical examples from leading public sector institutions that have utilized e-government as a basis to bring about change. It further investigates the relationship between citizens and government and how they are affected by e-government policies and programs. Aimed at students and researchers of public administration/management and information systems, this book serves as a welcome tool for examining and understanding e-government and transformational change.

Public Service Broadcasting Online

by Benedetta Brevini

This book investigates the extent to which a Public Service Broadcasting (PSB) ethos has been extended to the online world in Europe. It examines the most significant policy initiatives carried out by PSBs in Europe on online platforms, and analyzes how the public service philosophy is being reinvented by policy makers.

The Public Space of Social Media: Connected Cultures of the Network Society (Routledge Studies in New Media and Cyberculture)

by Therese Tierney

Social media is restructuring urban practices–through ad-hoc experimentation, commercial software development, and communities of participation. This book is the first to consider how practices contained within social media are situated within a larger genealogy of public space, including theories of communal identity, civitas and democracy, the fete, and self-expression. Through empirical research, the actual social practices of participants of networked publics are described and analyzed. Documenting how online counterpublics use the Internet to transmit classified photos, mobilize activists, and challenge the status quo, Tierney argues that online activities do not stop in online conversations; they are physically grounded through mobile GPS coordinates which are then transformed into activities in physical space—the street, the plaza, the places where people have traditionally gathered to demonstrate and express their opinions publicly.

Public Spheres and Mediated Social Networks in the Western Context and Beyond

by Petros Iosifidis Mark Wheeler

Social media is said to radically change the way in which public communication takes place: information diffuses faster and can reach a large number of people, but what makes the process so novel is that online networks can empower people to compete with traditional broadcasters or public figures. This book critically interrogates the contemporary relevance of social networks as a set of economic, cultural and political enterprises and as a public sphere in which a variety of political and socio-cultural demands can be met. It examines policy, regulatory and socio-cultural issues arising from the transformation of communication to a multi-layered sphere of online and social networks. The central theme of the book is to address the following questions: Are online and social networks an unstoppable democratizing and mobilizing force? Is there a need for policy and intervention to ensure the development of comprehensive and inclusive social networking frameworks? Social media are viewed both as a tool that allows citizens to influence policymaking, and as an object of new policies and regulations, such as data retention, privacy and copyright laws, around which citizens are mobilizing.

Public Transport Optimization

by Konstantinos Gkiotsalitis

This textbook provides a comprehensive step-by-step guide for new public transport modelers. It includes an introduction to mathematical modeling, continuous and discrete optimization, numerical optimization, computational complexity analysis, metaheuristics, and multi-objective optimization. These tools help engineers and modelers to use better existing public transport models and also develop new models that can address future challenges. By reading this book, the reader will gain the ability to translate a future problem description into a mathematical model and solve it using an appropriate solution method.The textbook provides the knowledge needed to develop highly accurate mathematical models that can serve as decision support tools at the strategic, tactical, and operational planning levels of public transport services. Its detailed description of exact optimization methods, metaheuristics, bi-level, and multi-objective optimization approaches together with the detailed description of implementing these approaches in classic public transport problems with the use of open source tools is unique and will be highly useful to students and transport professionals.

Refine Search

Showing 46,826 through 46,850 of 59,407 results