LEADER 02661nam 2200589Ia 450 001 9910454599703321 005 20200520144314.0 010 $a1-281-86302-5 010 $a9786611863029 010 $a0-8261-1722-8 035 $a(CKB)1000000000706001 035 $a(EBL)423257 035 $a(OCoLC)476261771 035 $a(SSID)ssj0000146619 035 $a(PQKBManifestationID)11137378 035 $a(PQKBTitleCode)TC0000146619 035 $a(PQKBWorkID)10186812 035 $a(PQKB)10462846 035 $a(MiAaPQ)EBC423257 035 $a(Au-PeEL)EBL423257 035 $a(CaPaEBR)ebr10265304 035 $a(EXLCZ)991000000000706001 100 $a19990316d1999 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aEncyclopedia of complementary health practice$b[electronic resource] /$fCarolyn Chambers Clark, editor in chief ; Rena J. Gordon, contributing editor ; Barbara Harris, Carl O. Helvie, advisory contributing editors 210 $aNew York $cSpringer Pub. Co.$dc1999 215 $a1 online resource (665 p.) 300 $aDescription based upon print version of record. 311 $a0-8261-1237-4 311 $a0-8261-1239-0 320 $aIncludes bibliographical references (p. 535-602) and index. 327 $aContents; The Editors; Preface; Publisher's Foreword; Part I: Contemporary Issues in Complementary Health Practices; Part II: Conditions; Part III: Influential Substances; Part IV: Practices and Treatments; Part V: Contributor Directory; Part VI: Resource Directory; References; Subject Index; Contributor Index 330 $aThis comprehensive resource of key terms and concepts in complementary health care addresses practices, health conditions, and research-based treatments. Over 300 entries by distinguished contributors to the field explain such alternative therapies as naturopathy, homeopathy, chiropractic, nutrition, and massage. One section is devoted to pertinent issues in complementary health practice including economics, legal ramifications, education, and historical perspectives. 606 $aAlternative medicine$vEncyclopedias 606 $aIntegrative medicine$vEncyclopedias 608 $aElectronic books. 615 0$aAlternative medicine 615 0$aIntegrative medicine 676 $a615.5/03 701 $aClark$b Carolyn Chambers$0877687 701 $aGordon$b Rena J$01032241 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910454599703321 996 $aEncyclopedia of complementary health practice$92465664 997 $aUNINA LEADER 04867nam 22007935 450 001 996465754303316 005 20200704084155.0 010 $a3-642-41227-0 024 7 $a10.1007/978-3-642-41227-1 035 $a(CKB)3710000000024404 035 $a(SSID)ssj0001049596 035 $a(PQKBManifestationID)11661890 035 $a(PQKBTitleCode)TC0001049596 035 $a(PQKBWorkID)11018634 035 $a(PQKB)10917883 035 $a(DE-He213)978-3-642-41227-1 035 $a(MiAaPQ)EBC3093015 035 $a(PPN)176115870 035 $a(EXLCZ)993710000000024404 100 $a20131015d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProvable Security$b[electronic resource] $e7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings /$fedited by Willy Susilo, Reza Reyhanitabar 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 347 p. 36 illus.) 225 1 $aSecurity and Cryptology ;$v8209 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-41226-2 327 $aOn Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols -- Authenticated Key Exchange Protocols Based on Factoring Assumption -- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round -- CIL Security Proof for a Password-Based Key Exchange -- Non Observability in the Random Oracle Model -- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture -- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges -- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption against Linear Related-Key Attacks -- Improved Authenticity Bound of EAX, and Refinements -- The Security of the OCB Mode of Operation without the SPRP Assumption -- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes -- How to Remove the Exponent GCD in HK09 -- Translation-Randomizable Distributions via Random Walks -- RKA Secure PKE Based on the DDH and HR Assumptions -- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext -- Factoring-Based Proxy Re-Encryption Schemes -- Towards a Secure Certificateless Proxy Re-Encryption Scheme. 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption. 410 0$aSecurity and Cryptology ;$v8209 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers and civilization 606 $aE-commerce 606 $aApplication software 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $aComputer Science, general$3https://scigraph.springernature.com/ontologies/product-market-codes/I00001 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aE-commerce. 615 0$aApplication software. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 615 24$ae-Commerce/e-business. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$aComputer Science, general. 676 $a005.8 702 $aSusilo$b Willy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReyhanitabar$b Reza$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465754303316 996 $aProvable Security$9772128 997 $aUNISA