You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.
This handbook is structured in two parts: it provides, on the one hand, a comprehensive (synchronic) overview of the phonetics and phonology (including prosody) of a breadth of Romance languages and focuses, on the other hand, on central topics of research in Romance segmental and suprasegmental phonology, including comparative and diachronic perspectives. Phonetics and phonology have always been a core discipline in Romance linguistics: the wide synchronic variety of languages and dialects derived from spoken Latin is extensively explored in numerous corpus and atlas projects, and for quite a few of these varieties there is also more or less ample documentation of at least some of their diachronic stages. This rich empirical database offers excellent testing grounds for different theoretical approaches and allows for substantial insights into phonological structuring as well as into (incipient, ongoing, or concluded) processes of phonological change. The volume can be read both as a state-of-the-art report of research in the field and as a manual of Romance languages with special emphasis on the key topics of phonetics and phonology.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.
This book focuses on the electronic properties of transition metals in coordination environments. These properties are responsible for the unique and intricate activity of transition metal sites in bio- and inorganic catalysis, but also pose challenges for both theoretical and experimental studies. Written by an international group of recognized experts, the book reviews recent advances in computational modeling and discusses their interplay using experiments. It covers a broad range of topics, including advanced computational methods for transition metal systems; spectroscopic, electrochemical and catalytic properties of transition metals in coordination environments; metalloenzymes and biomimetic compounds; and spin-related phenomena. As such, the book offers an invaluable resource for all researchers and postgraduate students interested in both fundamental and application-oriented research in the field of transition metal systems.