Author: Joseph Fontenrose
Publisher: Univ of California Press
ISBN: 0520331311
Category : Social Science
Languages : en
Pages : 494
Book Description
This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1978.
The Delphic Oracle
Author: Joseph Fontenrose
Publisher: Univ of California Press
ISBN: 0520331311
Category : Social Science
Languages : en
Pages : 494
Book Description
This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1978.
Publisher: Univ of California Press
ISBN: 0520331311
Category : Social Science
Languages : en
Pages : 494
Book Description
This title is part of UC Press's Voices Revived program, which commemorates University of California Press’s mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1978.
Operation Enduring Freedom
Author: Tim Ripley
Publisher: Casemate Publishers
ISBN: 1781599548
Category : History
Languages : en
Pages : 383
Book Description
The first six months of the war in Afghanistan were incredibly confused. Few journalists or civilians had access to the main events and the result was the creation of many urban myths that persist to this day. This book reveals the truth behind Operation Enduring Freedom, its objectives, successes, failures and consequences. Tim Ripley has discovered what actually happened in the first six months of this US-led intervention. He reveals the clandestine US and UK reconnaissance efforts before hostilities commenced on 7 October 2001, secret US UAV and drone operations, RAF Canberra and U-2 spy flights and details of initial combat between Taliban and Northern Alliance ground forces.This is a definitive account of the first six months of the military campaign in Afghanistan that saw the initial air and special drive to unseat the Taliban regime, the launching of search and destroy operations to hunt down Osama bin Ladens Al Qaeda organization and the setting up of President Hamid Karzais government in Kabul. These events were the catalyst for the subsequent and continuing war in that far-off troubled land.
Publisher: Casemate Publishers
ISBN: 1781599548
Category : History
Languages : en
Pages : 383
Book Description
The first six months of the war in Afghanistan were incredibly confused. Few journalists or civilians had access to the main events and the result was the creation of many urban myths that persist to this day. This book reveals the truth behind Operation Enduring Freedom, its objectives, successes, failures and consequences. Tim Ripley has discovered what actually happened in the first six months of this US-led intervention. He reveals the clandestine US and UK reconnaissance efforts before hostilities commenced on 7 October 2001, secret US UAV and drone operations, RAF Canberra and U-2 spy flights and details of initial combat between Taliban and Northern Alliance ground forces.This is a definitive account of the first six months of the military campaign in Afghanistan that saw the initial air and special drive to unseat the Taliban regime, the launching of search and destroy operations to hunt down Osama bin Ladens Al Qaeda organization and the setting up of President Hamid Karzais government in Kabul. These events were the catalyst for the subsequent and continuing war in that far-off troubled land.
The Cold War's Odd Couple
Author: Steve Tsang
Publisher: Bloomsbury Publishing
ISBN: 0857711482
Category : History
Languages : en
Pages : 288
Book Description
The relationship between the USA and the People's Republic of China (PRC) was the defining factor in the Cold War in Asia - the potentially explosive conflict which, as seen in the Korean War, brought the world to the brink of nuclear disaster. The PRC had not become 'Titoist' as some hoped and remained firmly within the Soviet international orbit. But how did Great Britain and the Republic of China (ROC) fit into this potentially lethal global jigsaw? Steve Tsang has illuminated the history of a seemingly obscure corner of international relations and politics but which was, to contempories, at the heart of global survival. He has carried out extensive research in unique Chinese- and English-language sources, both official and private.
Publisher: Bloomsbury Publishing
ISBN: 0857711482
Category : History
Languages : en
Pages : 288
Book Description
The relationship between the USA and the People's Republic of China (PRC) was the defining factor in the Cold War in Asia - the potentially explosive conflict which, as seen in the Korean War, brought the world to the brink of nuclear disaster. The PRC had not become 'Titoist' as some hoped and remained firmly within the Soviet international orbit. But how did Great Britain and the Republic of China (ROC) fit into this potentially lethal global jigsaw? Steve Tsang has illuminated the history of a seemingly obscure corner of international relations and politics but which was, to contempories, at the heart of global survival. He has carried out extensive research in unique Chinese- and English-language sources, both official and private.
Foreign Relations of the United States
Author: United States. Department of State
Publisher:
ISBN:
Category : United States
Languages : en
Pages : 1086
Book Description
Publisher:
ISBN:
Category : United States
Languages : en
Pages : 1086
Book Description
Modern Cryptography with Proof Techniques and Implementations
Author: Seong Oun Hwang
Publisher: CRC Press
ISBN: 100036450X
Category : Computers
Languages : en
Pages : 511
Book Description
Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes. Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 – 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.
Publisher: CRC Press
ISBN: 100036450X
Category : Computers
Languages : en
Pages : 511
Book Description
Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes. Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 – 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.
Algorithms and Computation
Author: Peter Eades
Publisher: Springer
ISBN: 3540456783
Category : Computers
Languages : en
Pages : 800
Book Description
This book constitutes the refereed proceedings of the 12th International Conference on Algorithms and Computation, ISAAC 2001, held in Christchurch, New Zealand in December 2001. The 62 revised full papers presented together with three invited papers were carefully reviewed and selected from a total of 124 submissions. The papers are organized in topical sections on combinatorial generation and optimization, parallel and distributed algorithms, graph drawing and algorithms, computational geometry, computational complexity and cryptology, automata and formal languages, computational biology and string matching, and algorithms and data structures.
Publisher: Springer
ISBN: 3540456783
Category : Computers
Languages : en
Pages : 800
Book Description
This book constitutes the refereed proceedings of the 12th International Conference on Algorithms and Computation, ISAAC 2001, held in Christchurch, New Zealand in December 2001. The 62 revised full papers presented together with three invited papers were carefully reviewed and selected from a total of 124 submissions. The papers are organized in topical sections on combinatorial generation and optimization, parallel and distributed algorithms, graph drawing and algorithms, computational geometry, computational complexity and cryptology, automata and formal languages, computational biology and string matching, and algorithms and data structures.
Copyright Law in an Age of Limitations and Exceptions
Author: Ruth L. Okediji
Publisher: Cambridge University Press
ISBN: 1316565262
Category : Law
Languages : en
Pages : 543
Book Description
Copyright Law in an Age of Limitations and Exceptions brings together leading copyright scholars and the field's foremost authorities to consider the critical role of copyright law in shaping the complex social, economic, and political interaction critical for cultural productivity and human flourishing. The book addresses defining issues facing copyright law today, including justifications for copyright law's limitations and exceptions (L&Es), the role of authors in copyright, users' rights, fair use politics and reform, the three-step test in European copyright law, the idea/expression principle with respect to functional works, limits on the use of L&Es in scientific innovation, and L&Es as a tool for economic development in international copyright law. The book also presents case studies on the historical development of the concept of 'neighboring rights' and on Harvard Law School's pioneering model of global copyright education, made possible by the exercise of L&Es across national borders.
Publisher: Cambridge University Press
ISBN: 1316565262
Category : Law
Languages : en
Pages : 543
Book Description
Copyright Law in an Age of Limitations and Exceptions brings together leading copyright scholars and the field's foremost authorities to consider the critical role of copyright law in shaping the complex social, economic, and political interaction critical for cultural productivity and human flourishing. The book addresses defining issues facing copyright law today, including justifications for copyright law's limitations and exceptions (L&Es), the role of authors in copyright, users' rights, fair use politics and reform, the three-step test in European copyright law, the idea/expression principle with respect to functional works, limits on the use of L&Es in scientific innovation, and L&Es as a tool for economic development in international copyright law. The book also presents case studies on the historical development of the concept of 'neighboring rights' and on Harvard Law School's pioneering model of global copyright education, made possible by the exercise of L&Es across national borders.
Advances in Cryptology -- CRYPTO 2014
Author: Juan A. Garay
Publisher: Springer
ISBN: 3662443716
Category : Computers
Languages : en
Pages : 589
Book Description
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
Publisher: Springer
ISBN: 3662443716
Category : Computers
Languages : en
Pages : 589
Book Description
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.
Advances in Cryptology – ASIACRYPT 2007
Author: Kaoru Kurosawa
Publisher: Springer
ISBN: 3540769005
Category : Computers
Languages : en
Pages : 594
Book Description
This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.
Publisher: Springer
ISBN: 3540769005
Category : Computers
Languages : en
Pages : 594
Book Description
This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.
Advances in Cryptology - ASIACRYPT 2004
Author: Pil Joong Lee
Publisher: Springer
ISBN: 3540305394
Category : Computers
Languages : en
Pages : 560
Book Description
The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.
Publisher: Springer
ISBN: 3540305394
Category : Computers
Languages : en
Pages : 560
Book Description
The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.