Matokeo ya Utafutaji
-
Tide Players
by Jianying ZhaTide Players depicts a new generation of entrepreneurs and intellectuals in a rapidly transforming China through six sharply etched and nuanced profiles which capture both the concrete detail and the epic dimension of life in contemporary Beijing.The cast of characters includes: an unlikely couple w... More
Language: ENGHakimiliki: 2011 -
China Pop
by Jianying ZhaChina Pop is a highly original and lively look at the ways that contemporary China is changing by Jianying Zha, a critic hailed in The Nation as "incisive, witty and eloquent all at once--a sort of female, Chinese Jonathan Spence." From her constant contact (and, in many cases, friendships) with a d... More
Language: ENGHakimiliki: 1995 -
Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings (Lecture Notes in Computer Science #13075)
This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on Octob... More
Language: ENGHakimiliki: 2021 -
Information Security
Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ´ lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediate... More
Language: ENGHakimiliki: 2010 -
Information Security and Cryptology
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissio... More
Language: ENGHakimiliki: 2015 -
Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions... More
Language: ENGHakimiliki: 2018 -
Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions... More
Language: ENGHakimiliki: 2018 -
Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust)
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking wor... More
Language: ENGHakimiliki: 2017 -
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12146)
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full pap... More
Language: ENGHakimiliki: 2020 -
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12147)
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full pape... More
Language: ENGHakimiliki: 2020 -
Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11999)
This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware... More
Language: ENGHakimiliki: 2020 -
Information and Communications Security: 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12282)
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer... More
Language: ENGHakimiliki: 2020 -
Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11605)
by Lingyu Wang • Jianying Zhou • Zhou Li • Robert Deng • Weizhi Meng • Suryadipta Majumdar • Kehuan ZhangThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. ... More
Language: ENGHakimiliki: 2019 -
Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings (Lecture Notes in Computer Science #12418)
by Cong Wang • Mauro Conti • Jianying Zhou • Zhou Li • Man Ho Au • Weizhi Meng • Martín Ochoa • Suryadipta Majumdar • Kehuan Zhang • Georgios Portokalidis • Lejla Batina • Chuadhry Mujeeb Ahmed • Jingqiang Lin • Eleonora Losiouk • Bo Luo • Stjepan PicekThis book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions.... More
Language: ENGHakimiliki: 2020 -
Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings (Lecture Notes in Computer Science #12809)
by Cong Wang • Jianying Zhou • Chunhua Su • Weizhi Meng • Suryadipta Majumdar • Lejla Batina • Chuadhry Mujeeb Ahmed • Jingqiang Lin • Eleonora Losiouk • Bo Luo • Stjepan Picek • Olga Gadyatskaya • Sudipta Chattopadhyay • Chenglu Jin • Mihalis Maniatakos • Daisuke Mashima • Masaki ShimaokaThis book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submission... More
Language: ENGHakimiliki: 2021 -
Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13285)
by Cong Wang • Jianying Zhou • Chunhua Su • Cristina Alcaraz • Emiliano Casalicchio • Weizhi Meng • Jun Shao • Suryadipta Majumdar • Lejla Batina • Jingqiang Lin • Eleonora Losiouk • Stjepan Picek • Sudipta Chattopadhyay • Chenglu Jin • Sridhar Adepu • Yury Zhauniarovich • Saman ZonouzThis book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in t... More
Language: ENGHakimiliki: 2022 -
The Cowshed
The Chinese Cultural Revolution began in 1966 and led to a ten-year-long reign of Maoist terror throughout China, in which millions died or were sent to labor camps in the country or subjected to other forms of extreme discipline and humiliation. Ji Xianlin was one of them. The Cowshed is Ji's ha... More
Language: ENGHakimiliki: 1998 -
China’s Provincial Economic Competitiveness and Policy Outlook for the 13th Five-year Plan Period (Research Series on the Chinese Dream and China’s Development Path)
This book focuses on the competitive situation and policy outlook of China’s provincial economy in the 13th five-year period. It begins with a general evaluation report on the country’s provincial comprehensive Economic Competitiveness, followed by analyses at the international, national and regiona... More
Language: ENGHakimiliki: 2018