LEADER 04150nam 2200637 450 001 9910819924403321 005 20230803212535.0 010 $a0-309-31299-X 010 $a0-309-31297-3 035 $a(CKB)3710000000336164 035 $a(EBL)3379405 035 $a(SSID)ssj0001469003 035 $a(PQKBManifestationID)11766447 035 $a(PQKBTitleCode)TC0001469003 035 $a(PQKBWorkID)11527355 035 $a(PQKB)11523616 035 $a(MiAaPQ)EBC3379405 035 $a(Au-PeEL)EBL3379405 035 $a(CaPaEBR)ebr11003353 035 $a(OCoLC)903633647 035 $a(EXLCZ)993710000000336164 100 $a20150121h20142014 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIndia-united states cooperation on science and technology for countering terrorism $esummary of a workshop /$fRita Guenther, Micah Lowenthal, and Lalitha Sundaresan 210 1$aWashington, District of Columbia :$cThe National Academies Press,$d2014. 210 4$d©2014 215 $a1 online resource (184 p.) 300 $aDescription based upon print version of record. 311 $a0-309-31296-5 327 $a""Front Matter""; ""Preface and Acknowledgments""; ""Contents""; ""Synopsis""; ""1 The Realities of Terrorism in India""; ""2 Systems Approaches to Countering Terrorism""; ""3 Protecting Critical Infrastructure""; ""4 Science and Technology to Counter Terrorism in Critical Areas""; ""5 Emergency Management and Response: All-Hazards Approach""; ""6 Learning and Applying Best Practices to Counter Terrorism""; ""Appendix A: India-U.S. Workshop on Science and Technology for Countering Terrorism--Final Agenda""; ""Appendix B: Statement of Task"" 327 $a""Appendix C: Biographical Sketches of Workshop Speakers and Session Moderators""""Appendix D: Biographical Sketches of the U.S. National Research Council Planning Committee Members""; ""Appendix E: Biographical Sketches of National Institute for Advanced Studies Planning Committee Members"" 330 $a"India and the United States are the world's two largest democracies with distinguished scientific traditions and experts in a wide range of scientific-technical fields. Given these strengths and the ability to learn from one another, the U.S. National Academy of Sciences together with the National Institute for Advanced Studies in Bangalore, India, held a joint Indian-U.S. workshop to identify and examine potential areas for substantive scientific and technical cooperation that can support counterterrorism efforts through the Homeland Security Dialogue and through direct cooperation. India-United States Cooperation on Science and Technology for Countering Terrorism is the summary of that workshop. This report examines topics such as biological threats; protection of nuclear facilities; security (physical and cyber) for chemicals, chemical facilities and other critical infrastructure; and monitoring, surveillance, and emergency response. The report also identifies and examines promising areas for further Indian-U.S. cooperation."--Publisher's description. 606 $aTerrorism$xPrevention$xTechnological innovations$vCongresses 607 $aUnited States$xForeign relations$zIndia 607 $aIndia$xForeign relations$zUnited States 607 $aIndia$2fast 607 $aUnited States$2fast 615 0$aTerrorism$xPrevention$xTechnological innovations 676 $a363.325 700 $aGuenther$b Rita$01668592 702 $aLowenthal$b Micah 702 $aSundaresan$b Lalitha 712 02$aCommittee on India-United States Cooperation on Science and Technology for Countering Terrorism. 712 02$aNational Academy of Sciences the National Academies. 712 12$aCommittee on India-United States Cooperation on Science and Technology for Countering Terrorism (Workshop) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910819924403321 996 $aIndia-united states cooperation on science and technology for countering terrorism$94029290 997 $aUNINA LEADER 03682nam 22007215 450 001 996635666303316 005 20241211115244.0 010 $a9789819609383 010 $a9819609380 024 7 $a10.1007/978-981-96-0938-3 035 $a(MiAaPQ)EBC31836163 035 $a(Au-PeEL)EBL31836163 035 $a(CKB)37011160000041 035 $a(DE-He213)978-981-96-0938-3 035 $a(EXLCZ)9937011160000041 100 $a20241211d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? ASIACRYPT 2024 $e30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9?13, 2024, Proceedings, Part VI /$fedited by Kai-Min Chung, Yu Sasaki 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (508 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15489 311 08$a9789819609376 311 08$a9819609372 327 $aSecure Multiparty Computation -- Blockchain Protocols -- Information-theoretic Cryptography. 330 $aThe 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9?13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15489 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aCryptology 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSecurity Services 606 $aMobile and Network Security 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 676 $a005.824 700 $aChung$b Kai-Min$01782610 701 $aSasaki$b Yu$01695891 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996635666303316 996 $aAdvances in Cryptology ? ASIACRYPT 2024$94309018 997 $aUNISA LEADER 02946oam 22005654a 450 001 9910316449303321 005 20230621135718.0 010 $a1-950192-20-2 024 7 $a10.21983/P3.0248.1.00 035 $a(CKB)4100000007881609 035 $a(OAPEN)1004825 035 $a(OCoLC)1100539650 035 $a(MdBmJHUP)muse77058 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/26991 035 $a(oapen)doab26991 035 $a(EXLCZ)994100000007881609 100 $a20190314d2019 uy 0 101 0 $aeng 135 $aurmu#---auuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Imagery of Interior Spaces$fDominique Bauer ; [edited by] Dominique Bauer, Michael J. Kelly 205 $a1st edition. 210 $aBrooklyn, NY$cpunctum books$d2019 210 1$aSanta Barbara, CA :$cPunctum Books,$d2019. 210 4$d©2019. 215 $a1 online resource (241 pages) $cillustrations; PDF, digital file(s) 311 08$a1-950192-19-9 320 $aIncludes bibliographical references. 330 $aOn the unstable boundaries between ?interior? and ?exterior,? ?private? and ?public,? and always in some way relating to a ?beyond,? the imagery of interior space in literature reveals itself as an often disruptive code of subjectivity and of modernity. The wide variety of interior spaces elicited in literature ? from the odd room over the womb, secluded parks, and train compartments, to the city as a world under a cloth ? reveal a common defining feature: these interiors can all be analyzed as codes of a paradoxical, both assertive and fragile, subjectivity in its own unique time and history. They function as subtexts that define subjectivity, time, and history as profoundly ambiguous realities, on interchangeable existential, socio-political, and epistemological levels. This volume addresses the imagery of interior spaces in a number of iconic and also lesser known yet significant authors of European, North American, and Latin American literature of the nineteenth, twentieth, and twenty-first centuries: Djuna Barnes, Edmond de Goncourt, William Faulkner, Gabriel García Márquez, Benito Pérez Galdós, Elsa Morante, Robert Musil, Jules Romains, Peter Waterhouse, and Émile Zola. 606 $aLiterary theory$2bicssc 608 $aElectronic books. 610 $aliterary studies 610 $ainterior design 610 $aarchitecture 610 $acultural studies 610 $aspatiality 615 7$aLiterary theory 676 $a809.93358 700 $aBauer$b Dominique$0932972 702 $aKelly$b Michael J$4edt 702 $aBauer$b Dominique$4oth 702 $aKelly$b Michael J$4oth 801 0$bMdBmJHUP 801 1$bMdBmJHUP 906 $aBOOK 912 $a9910316449303321 996 $aThe Imagery of Interior Spaces$92428725 997 $aUNINA