Skip to main content
Ingia
Bookshare Kenya: Home
-A +A
  • Lugha
    • English
    • Swahili
Msaada

Matokeo ya Utafutaji

Search results: 18
  • Tide Players

    Tide Players

    by Jianying Zha

    Tide Players depicts a new generation of entrepreneurs and intellectuals in a rapidly transforming China through six sharply etched and nuanced profiles which capture both the concrete detail and the epic dimension of life in contemporary Beijing.The cast of characters includes: an unlikely couple w... More

    Language: ENG
    Hakimiliki: 2011
  • China Pop

    China Pop

    by Jianying Zha

    China Pop is a highly original and lively look at the ways that contemporary China is changing by Jianying Zha, a critic hailed in The Nation as "incisive, witty and eloquent all at once--a sort of female, Chinese Jonathan Spence." From her constant contact (and, in many cases, friendships) with a d... More

    Language: ENG
    Hakimiliki: 1995
  • Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings (Lecture Notes in Computer Science #13075)

    Security and Trust Management: 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings (Lecture Notes in Computer Science #13075)

    by Rodrigo Roman • Jianying Zhou

    This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on Octob... More

    Language: ENG
    Hakimiliki: 2021
  • Information Security

    Information Security

    by Jianying Zhou • Phong Q. Nguyen

    Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ´ lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediate... More

    Language: ENG
    Hakimiliki: 2010
  • Information Security and Cryptology

    Information Security and Cryptology

    by Moti Yung • Dongdai Lin • Jianying Zhou

    This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissio... More

    Language: ENG
    Hakimiliki: 2015
  • Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)

    Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)

    by Javier Lopez • Jianying Zhou • Miguel Soriano

    The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions... More

    Language: ENG
    Hakimiliki: 2018
  • Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)

    Computer Security: 14th International Conference, Isc 2011, Xi'an, China, October 26-29, 2011, Proceedings (Lecture Notes In Computer Science / Security And Cryptology Ser. #3650)

    by Javier Lopez • Jianying Zhou • Miguel Soriano

    The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.The 56 revised full papers presented were carefully reviewed and selected from 283 submissions... More

    Language: ENG
    Hakimiliki: 2018
  • Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust)

    Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust)

    by Steven Furnell • Jianying Zhou • Xiapu Luo • Weizhi Meng

    This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking wor... More

    Language: ENG
    Hakimiliki: 2017
  • Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12146)

    Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12146)

    by Mauro Conti • Jianying Zhou • Emiliano Casalicchio • Angelo Spognardi

    This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full pap... More

    Language: ENG
    Hakimiliki: 2020
  • Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12147)

    Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12147)

    by Mauro Conti • Jianying Zhou • Emiliano Casalicchio • Angelo Spognardi

    This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full pape... More

    Language: ENG
    Hakimiliki: 2020
  • Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11999)

    Information and Communications Security: 21st International Conference, ICICS 2019, Beijing, China, December 15–17, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11999)

    by Jianying Zhou • Xiapu Luo • Qingni Shen • Zhen Xu

    This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware... More

    Language: ENG
    Hakimiliki: 2020
  • Information and Communications Security: 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12282)

    Information and Communications Security: 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12282)

    by Jianying Zhou • Dieter Gollmann • Weizhi Meng • Christian D. Jensen

    This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer... More

    Language: ENG
    Hakimiliki: 2020
  • Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11605)

    Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11605)

    by Lingyu Wang • Jianying Zhou • Zhou Li • Robert Deng • Weizhi Meng • Suryadipta Majumdar • Kehuan Zhang

    This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. ... More

    Language: ENG
    Hakimiliki: 2019
  • Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings (Lecture Notes in Computer Science #12418)

    Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings (Lecture Notes in Computer Science #12418)

    by Cong Wang • Mauro Conti • Jianying Zhou • Zhou Li • Man Ho Au • Weizhi Meng • Martín Ochoa • Suryadipta Majumdar • Kehuan Zhang • Georgios Portokalidis • Lejla Batina • Chuadhry Mujeeb Ahmed • Jingqiang Lin • Eleonora Losiouk • Bo Luo • Stjepan Picek

    This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions.... More

    Language: ENG
    Hakimiliki: 2020
  • Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings (Lecture Notes in Computer Science #12809)

    Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings (Lecture Notes in Computer Science #12809)

    by Cong Wang • Jianying Zhou • Chunhua Su • Weizhi Meng • Suryadipta Majumdar • Lejla Batina • Chuadhry Mujeeb Ahmed • Jingqiang Lin • Eleonora Losiouk • Bo Luo • Stjepan Picek • Olga Gadyatskaya • Sudipta Chattopadhyay • Chenglu Jin • Mihalis Maniatakos • Daisuke Mashima • Masaki Shimaoka

    This book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submission... More

    Language: ENG
    Hakimiliki: 2021
  • Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13285)

    Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13285)

    by Cong Wang • Jianying Zhou • Chunhua Su • Cristina Alcaraz • Emiliano Casalicchio • Weizhi Meng • Jun Shao • Suryadipta Majumdar • Lejla Batina • Jingqiang Lin • Eleonora Losiouk • Stjepan Picek • Sudipta Chattopadhyay • Chenglu Jin • Sridhar Adepu • Yury Zhauniarovich • Saman Zonouz

    This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in t... More

    Language: ENG
    Hakimiliki: 2022
  • The Cowshed

    The Cowshed

    by Chenxing Jiang • Zha Jianying • Ji Xianlin

    The Chinese Cultural Revolution began in 1966 and led to a ten-year-long reign of Maoist terror throughout China, in which millions died or were sent to labor camps in the country or subjected to other forms of extreme discipline and humiliation. Ji Xianlin was one of them. The Cowshed is Ji's ha... More

    Language: ENG
    Hakimiliki: 1998
  • China’s Provincial Economic Competitiveness and Policy Outlook for the 13th Five-year Plan Period (Research Series on the Chinese Dream and China’s Development Path)

    China’s Provincial Economic Competitiveness and Policy Outlook for the 13th Five-year Plan Period (Research Series on the Chinese Dream and China’s Development Path)

    by Jianping Li • Minrong Li • Maoxing Huang • Yanjing Gao • Jianjian Li • Hongwen Su

    This book focuses on the competitive situation and policy outlook of China’s provincial economy in the 13th five-year period. It begins with a general evaluation report on the country’s provincial comprehensive Economic Competitiveness, followed by analyses at the international, national and regiona... More

    Language: ENG
    Hakimiliki: 2018
Takasa Utafutaji
Show More Results

Takasa Utafutaji

Enter a 10 or 13 digit numerical ISBN code
Kategoria
Ondoa

Footer

  • Kuhusu
  • Partners
  • Sheria
  • Zana za Ulemavu
  • Faragha
  • Contact
  • Blogu
Bookshare® na Benetech® ni alama za biashara zilizosajiliwa na Beneficent Technology, Inc. Beneficent Technology , Inc. Tovuti hii ni © Hakimiliki 2002-2023, Beneficent Technology, Inc.