Search results for: a-secret-shared

A Secret Shared

Author : Marion Lennox
File Size : 70.44 MB
Format : PDF, ePub, Docs
Download : 711
Read : 1123
Download »
Is a secret halved…? High-flying oncologist professor Jack Kincaid isn't convinced by the treatment offered at Dolphin Bay Healing Resort. But if there's the slightest possibility that dolphins can help his little nephew Harry, he needs to give it a chance! Especially when he recognizes beautiful therapist Dr. Kate Martin—the woman he once knew as Cathy! Jack can't help but be intrigued, and he's just as attracted to her as he always was. And when Kate reveals to him the devastating secret that she will do anything to escape, not only does she share her burden, but she starts to open up Jack's locked-away heart, too….

Information Security

Author : Sherman S.M. Chow
File Size : 80.66 MB
Format : PDF, Mobi
Download : 908
Read : 815
Download »
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Topics in Cryptology CT RSA 2021

Author : Kenneth G. Paterson
File Size : 54.20 MB
Format : PDF
Download : 809
Read : 1166
Download »
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2021, CT-RSA 2021, held in San Francisco, CA, USA, in May 2021.* The 27 full papers presented in this volume were carefully reviewed and selected from 100 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security. *The conference was held virtually.

Computer Security ESORICS 2017

Author : Simon N. Foley
File Size : 37.86 MB
Format : PDF, ePub, Mobi
Download : 748
Read : 436
Download »
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Progress in Cryptology LATINCRYPT 2021

Author : Patrick Longa
File Size : 68.31 MB
Format : PDF, Kindle
Download : 359
Read : 500
Download »
This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security in Latin America, LATIN 2021, which was held in October 2021. The conference was originally planned to take place in Bogota, Colombia, but changed to a virtual event due to the COVID-19 pandemic. The 22 full papers included in this volume were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: quantum cryptography; post-quantum cryptography; asymmetric cryptanalysis; cryptanalysis and side-channel analysis; distributed cryptographic protocols; and multiparty computation.

Others

Author : Joseph Hillis Miller
File Size : 43.32 MB
Format : PDF, ePub
Download : 214
Read : 561
Download »
This volume fulfills the author's career-long reflections on radical otherness in literature. J. Hillis Miller investigates otherness through ten nineteenth- and twentieth-century authors: Friedrich Schlegel, Charles Dickens, George Eliot, Anthony Trollope, Joseph Conrad, W. B. Yeats, E. M. Forster, Marcel Proust, Paul de Man, and Jacques Derrida. From the exquisite close readings for which he is celebrated, Miller reaps a capacious understanding of otherness--one reachable not through theory but through literature itself. Otherness has wide valence in contemporary literary and cultural studies and is often understood as a misconception by hegemonic groups of subaltern ones. In a pleasing counter to this, Others conceives of otherness as something that inhabits sameness. Instances of the ''wholly other'' within the familiar include your sense of self or your beloved, your sense of your culture as such, or your experience of literary, theoretical, and philosophical works that belong to your own culture--works that are themselves haunted by otherness. Though Others begins and ends with chapters on theorists, the testimony they offer about otherness is not taken as more compelling than that of such literary works as Dicken's Our Mutual Friend, Conrad's ''The Secret Sharer,'' Yeats's ''Cold Heaven,'' or Proust's Remembrance of Things Past. Otherness, as this book finds it in the writers read, is not an abstract concept. It is an elusive feature of specific verbal constructs, different in each case. It can be glimpsed only through close readings that respect this diversity, as the plural in the title--Others--indicates. We perceive otherness in the way that the unseen--and the characters' emotional responses to it--ripples the conservative ideological surface of Howard's End. We sense it as chaos in Schlegel's radical concept of irony. And we gaze at it in the multiple personifications of Heart of Darkness. Each testifies in its own way to the richness and tangible weight of an otherness close at hand.

Information Security and Cryptology ICISC 2012

Author : Taekyoung Kwon
File Size : 48.30 MB
Format : PDF, Docs
Download : 321
Read : 964
Download »
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

Signal and Image Processing for Biometrics

Author : Amine Nait-Ali
File Size : 73.53 MB
Format : PDF, ePub, Docs
Download : 678
Read : 675
Download »
The aim of this book is to deal with biometrics in terms of signal and image processing methods and algorithms. This will help engineers and students working in digital signal and image processing deal with the implementation of such specific algorithms. It discusses numerous signal and image processing techniques that are very often used in biometric applications. In particular, algorithms related to hand feature extraction, speech recognition, 2D/3D face biometrics, video surveillance and other interesting approaches are presented. Moreover, in some chapters, Matlab codes are provided so that readers can easily reproduce some basic simulation results. This book is suitable for final-year undergraduate students, postgraduate students, engineers and researchers in the field of computer engineering and applied digital signal and image processing. 1. Introduction to Biometrics, Bernadette Dorizzi. 2. Introduction to 2D Face Recognition, Amine Nait-Ali and Dalila Cherifi. 3. Facial Soft Biometrics for Person Recognition, Antitza Dantcheva, Christelle Yemdji, Petros Elia and Jean-Luc Dugelay. 4. Modeling, Reconstruction and Tracking for Face Recognition, Catherine Herold, Vincent Despiegel, Stéphane Gentric, Séverine Dubuisson and Isabelle Bloch. 5. 3D Face Recognition, Mohsen Ardabilian, Przemyslaw Szeptycki, Di Huang and Liming Chen. 6. Introduction to Iris Biometrics, Kamel Aloui, Amine Nait-Ali, Régis Fournier and Saber Naceur. 7. Voice Biometrics: Speaker Verification and Identification, Foezur Chowdhury, Sid-Ahmed Selouani and Douglas O’Shaughnessy. 8. Introduction to Hand Biometrics, Régis Fournier and Amine Nait-Ali. 9. Multibiometrics, Romain Giot, Baptiste Hemery, Estelle Cherrier and Christophe Rosenberger. 10. Hidden Biometrics, Amine Nait-Ali, Régis Fournier, Kamel Aloui and Noureddine Belgacem. 11. Performance Evaluation of Biometric Systems, Mohamad El-Abed, Romain Giot, Baptiste Hemery, Julien Mahier and Christophe Rosenberger. 12. Classification Techniques for Biometrics, Amel Bouchemha, Chérif Nait-Hamoud, Amine Nait-Ali and Régis Fournier. 13. Data Cryptography, Islam Naveed and William Puech. 14. Visual Data Protection, Islam Naveed and William Puech. 15. Biometrics in Forensics, Guillaume Galou and Christophe Lambert.

Progress in Cryptology INDOCRYPT 2020

Author : Karthikeyan Bhargavan
File Size : 74.94 MB
Format : PDF, Mobi
Download : 602
Read : 1114
Download »
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology in India, INDOCRYPT 2020, held in Bangalore, India, in December 2020.The 39 full papers presented together with 3 invited abstracts in this book were carefully reviewed and selected from 84 submissions. Apart from its traditional focus on areas in applied and theoretical cryptology, this year INDOCRYPT solicited papers in the area of Formal Methods for Cryptographic Systems as well and much more.

What Can Parents Do

Author : Margaret Kerr
File Size : 57.94 MB
Format : PDF, ePub, Mobi
Download : 233
Read : 538
Download »
In recent years research on parenting has changed stance from one where parents shape child outcomes to an interactive perspective. However this shift is only now transferring to adolescents, with research exploring how the roles that adolescents and parents play in their interactions can lead to problem behaviour. Part of the Hot Topics in Developmental Research series, this book presents the new perspective.