You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents
Head and neck cancers, most commonly head and neck squamous cell carcinomas (HNSCCs), are highly aggressive and represent one of the most common cancers worldwide. HPV infection, excessive tobacco and alcohol use, and long-term inflammation are carcinogenic factors of head HNSCC. Conventional therapies for head and neck tumors including surgical intervention, chemotherapy, and radiation therapy have limited effectiveness, even with the development of cetuximab and immune checkpoint blockade (ICB) therapy, particularly in cases of recurrent or metastatic (R/M) diseases. The tumor microenvironment (TME), with its intricate dynamic composition for tumor initiation and progression, plays a signi...
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography.
Originally classified as ‘junk DNA’, genomic regions which are transcribed into RNAs that do not serve as template for protein production have attracted increasing attention in the last two decades. The discovery of a very rich and diverse set of non-coding RNA transcripts has been possible thanks to technological and bioinformatic advances in transcriptomic methods. Some of these regions are of unknown function, but increasing evidence has shown that non-coding RNAs, short and long, play a crucial regulatory role in almost every know biological process. While some of the mechanisms of biogenesis and regulation of non-coding RNAs still need to be elucidated, several non-coding RNAs are i...
The only exception was the Immortal Hero! Sword, the king of weapons! Immortal enlightenment was a matter of life and death, and was eternal! Sword Immortal, Heaven's Sword, and Grounds!
This book describes and analyzes the situation of minority languages in China.
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
本书收录了二十世纪海内外中文著作者约15000多人的笔名约40000多个,按照汉语拼音顺序编排,并提供各式拼音对照表、汉语拼音音节对照表。