07008nam 22008055 450 99646583010331620210611121039.010.1007/b137750(CKB)1000000000213089(SSID)ssj0000318280(PQKBManifestationID)11265153(PQKBTitleCode)TC0000318280(PQKBWorkID)10310201(PQKB)11184139(DE-He213)978-3-540-31684-8(MiAaPQ)EBC3067866(PPN)123095743(EXLCZ)99100000000021308920100926d2005 u| 0engurnn#008mamaatxtccrInformation Security and Privacy[electronic resource] 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings /edited by Colin Boyd, Juan M. González Nieto1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XIV, 594 p.)Security and Cryptology ;3574Bibliographic Level Mode of Issuance: Monograph3-540-31684-1 3-540-26547-3 Includes bibliographical references and author index.Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generators -- On the Success Probability of ? 2-attack on RC6 -- Solving Systems of Differential Equations of Addition -- Group Communications -- A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead -- Dynamic Group Key Agreement in Tree-Based Setting -- Immediate Data Authentication for Multicast in Resource Constrained Network -- Elliptic Curve Cryptography -- Redundant Trinomials for Finite Fields of Characteristic 2 -- Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields -- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two -- Mobile Security -- Using “Fair Forfeit” to Prevent Truncation Attacks on Mobile Agents -- An Improved Execution Integrity Solution for Mobile Agents -- RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management -- Side Channel Attacks -- Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards -- Improved Zero Value Attack on XTR -- Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks -- Evaluation and Biometrics -- SIFA: A Tool for Evaluation of High-Grade Security Devices -- Cancelable Key-Based Fingerprint Templates -- Public Key Cryptosystems -- Hybrid Signcryption Schemes with Insider Security -- On the Possibility of Constructing Meaningful Hash Collisions for Public Keys -- Tunable Balancing of RSA -- Access Control I -- Key Management for Role Hierarchy in Distributed Systems -- A Formalization of Distributed Authorization with Delegation -- Signatures I -- Two Improved Partially Blind Signature Schemes from Bilinear Pairings -- On the Security of Nominative Signatures -- Invited Talk -- Who Goes There? Internet Banking: A Matter of Risk and Reward -- Access Control II -- Role Activation Management in Role Based Access Control -- VO-Sec: An Access Control Framework for Dynamic Virtual Organization -- Threshold Cryptography -- An Efficient Implementation of a Threshold RSA Signature Scheme -- GBD Threshold Cryptography with an Application to RSA Key Recovery -- An (n–t)-out-of-n Threshold Ring Signature Scheme -- Protocols I -- Deposit-Case Attack Against Secure Roaming -- Security Requirements for Key Establishment Proof Models: Revisiting Bellare–Rogaway and Jeong–Katz–Lee Protocols -- Group Signatures -- Group Signature Schemes with Membership Revocation for Large Groups -- An Efficient Group Signature Scheme from Bilinear Maps -- Group Signature Where Group Manager, Members and Open Authority Are Identity-Based -- Protocols II -- Analysis of the HIP Base Exchange Protocol -- ID-based Authenticated Key Agreement for Low-Power Mobile Devices -- Signatures II -- On the Security of Two Key-Updating Signature Schemes -- Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS -- Invited Talk -- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security -- Credentials -- Security Analysis and Fix of an Anonymous Credential System -- Counting Abuses Using Flexible Off-line Credentials -- Symmetric Cryptography -- Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity -- New Cryptographic Applications of Boolean Function Equivalence Classes.Security and Cryptology ;3574Data encryption (Computer science)Computer communication systemsOperating systems (Computers)Coding theoryInformation theoryAlgorithmsManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Coding theory.Information theory.Algorithms.Management information systems.Computer science.Cryptology.Computer Communication Networks.Operating Systems.Coding and Information Theory.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.005.8Boyd Colinedthttp://id.loc.gov/vocabulary/relators/edtGonzález Nieto Juan Medthttp://id.loc.gov/vocabulary/relators/edtBOOK996465830103316Information Security and Privacy772014UNISA03278nam 22007575 450 991096747410332120240508205240.09786610282951978128028295912802829599780230005525023000552710.1057/9780230005525(CKB)1000000000398988(SSID)ssj0001661406(PQKBManifestationID)16440909(PQKBTitleCode)TC0001661406(PQKBWorkID)14988688(PQKB)10584119(DE-He213)978-0-230-00552-5(MiAaPQ)EBC343777(Perlego)3479337(EXLCZ)99100000000039898820151125d2005 u| 0engurnn#008mamaatxtccrVestiges of Colonial Empire in France /by R. Aldrich1st ed. 2005.London :Palgrave Macmillan UK :Imprint: Palgrave Macmillan,2005.1 online resource (IX, 383 p.)Bibliographic Level Mode of Issuance: Monograph9781349516797 1349516791 9781403933706 1403933707 Includes bibliographical references (p. 365-376) and index.Cover -- Contents -- List of Illustrations -- List of Abbreviations -- Preface -- Introduction: Sites of Colonial Memory -- 1 The Colonies in Paris -- 2 The Colonies in the Provinces -- 3 Colonial War Memorials -- 4 Of Men and Monuments -- 5 The Colonies in Museums -- 6 The Colonial Legacy of Non-Western Art in French Museums -- 7 Temporary Exhibitions: Changing Perspectives -- Conclusion: The Future of the Colonial Past -- Notes -- Bibliography -- Index.This book offers the first comprehensive study of 'sites of memory' in France connected to the history of French imperialism and colonialism, and the ways that the French have remembered or forgotten their colonial past. Through a study of monuments, memorials, museum collections and other 'sites of memory' in France connected with France's overseas empire this book analyzes the way in which French authorities marked the Paris and provincial landscapes with these reminders of France's colonial 'mission' during the period of imperial expansion, and the fate of these sites in the post-colonial period and what that evolution reveals about French memory and amnesia of the colonial epoch.EuropeHistoryHistory, ModernFranceHistoryArchitectureEuropean HistoryModern HistoryHistory of FranceArchitectureEuropeHistory.History, Modern.FranceHistory.Architecture.European History.Modern History.History of France.Architecture.325/.344Aldrich Robert1954-1790587MiAaPQMiAaPQMiAaPQBOOK9910967474103321Vestiges of Colonial Empire in France4327340UNINA04988nam 22007334a 450 991096532780332120251107134040.097866106044329780309133708030913370X978128060443012806044339780309657273030965727X(CKB)1000000000467211(SSID)ssj0000246766(PQKBManifestationID)11173963(PQKBTitleCode)TC0000246766(PQKBWorkID)10189247(PQKB)10163557(MiAaPQ)EBC3378140(Au-PeEL)EBL3378140(CaPaEBR)ebr10146770(CaONFJC)MIL60443(OCoLC)923277134(Perlego)4738286(DNLM)1275445(BIP)13425450(EXLCZ)99100000000046721120060427d2006 uy 0engurcn|||||||||txtccrSleep disorders and sleep deprivation an unmet public health problem /Committee on Sleep Medicine and Research, Board on Health Sciences Policy ; Harvey R. Colten and Bruce M. Altevogt, editors1st ed.Washington, DC Institute of Medicine National Academies Pressc2006xviii, 404 p. illBibliographic Level Mode of Issuance: Monograph9780309101110 0309101115 Includes bibliographical references and index.FrontMatter -- Independent Report Reviewers -- Preface -- Acknowledgments -- Contents -- Summary -- 1 Introduction -- 2 Sleep Physiology -- 3 Extent and Health Consequences of Chronic Sleep Loss and Sleep Disorders -- 4 Functional and Economic Impact of Sleep Loss and Sleep-Related Disorders -- 5 Improving Awareness, Diagnosis, and Treatment of Sleep Disorders -- 6 Ensuring Adequate Diagnosis and Treatment: Access, Capacity, and Technology Development -- 7 Opportunities to Improve Career Development in Somnology -- 8 Bolstering Somnology and Sleep Disorders Research Programs -- 9 Building Sleep Programs in Academic Health Centers -- Appendixes -- A Study Process -- B Acronyms -- C Glossary of Major Terms -- D Congressional Language Establishing the National Center on Sleep Disorders Research, 285b-7 -- E Sleep Disorders Research Advisory Board Membership -- F National Institutes of Health Sleep-Related Initiatives: 1994-2004 -- G National Institutes of Health Support of Sleep-Related R01 Grants -- H Summary of NIH Support of Sleep-Related Career Development Awards -- I Summary of NIH Support of Sleep-Related R13, R25, P, F, T, and U Grants -- J Summary of Investment in Sleep-Related Projects at the Top 30 NIH-Funded Institutions -- K Biographical Sketches of Committee Members and Staff -- Index.Clinical practice related to sleep problems and sleep disorders has been expanding rapidly in the last few years, but scientific research is not keeping pace. Sleep apnea, insomnia, and restless legs syndrome are three examples of very common disorders for which we have little biological information. This new book cuts across a variety of medical disciplines such as neurology, pulmonology, pediatrics, internal medicine, psychiatry, psychology, otolaryngology, and nursing, as well as other medical practices with an interest in the management of sleep pathology. This area of research is not limited to very young and old patients "sleep disorders reach across all ages and ethnicities. Sleep Disorders and Sleep Deprivation presents a structured analysis that explores the following: Improving awareness among the general public and health care professionals. Increasing investment in interdisciplinary somnology and sleep medicine research training and mentoring activities. Validating and developing new and existing technologies for diagnosis and treatment. This book will be of interest to those looking to learn more about the enormous public health burden of sleep disorders and sleep deprivation and the strikingly limited capacity of the health care enterprise to identify and treat the majority of individuals suffering from sleep problems. Sleep disordersSocial aspectsSleep deprivationSocial aspectsSleepSocial aspectsPublic healthSleep disordersSocial aspects.Sleep deprivationSocial aspects.SleepSocial aspects.Public health.362.196/8498Colten Harvey R1811490Altevogt Bruce M1791694Institute of Medicine (U.S.).Committee on Sleep Medicine and Research.MiAaPQMiAaPQMiAaPQBOOK9910965327803321Sleep disorders and sleep deprivation4363382UNINA