LEADER 05194nam 2200673Ia 450 001 9910145425803321 005 20230721030746.0 010 $a1-281-20391-2 010 $a9786611203917 010 $a0-470-22506-8 010 $a0-470-22507-6 035 $a(CKB)1000000000402578 035 $a(EBL)331575 035 $a(OCoLC)437200228 035 $a(SSID)ssj0000147252 035 $a(PQKBManifestationID)11161779 035 $a(PQKBTitleCode)TC0000147252 035 $a(PQKBWorkID)10010468 035 $a(PQKB)11241841 035 $a(MiAaPQ)EBC331575 035 $a(Au-PeEL)EBL331575 035 $a(CaPaEBR)ebr10225438 035 $a(CaONFJC)MIL120391 035 $a(EXLCZ)991000000000402578 100 $a20070604d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEnergizing our future$b[electronic resource] $erational choices for the 21st century /$fJohn R. Wilson, Griffin Burgh 210 $aHoboken, N.J. $cWiley-Interscience$dc2008 215 $a1 online resource (418 p.) 300 $aDescription based upon print version of record. 311 $a0-471-79053-2 320 $aIncludes bibliographical references and index. 327 $aENERGIZING OUR FUTURE; CONTENTS; Preface; Acknowledgment; Introduction: Rising Energy Costs; PART I A TRILOGY OF POPULAR MISCONCEPTIONS; 1 Global Warming; Conventional Wisdom; CO(2) and the Carbon Cycle; The Greenhouse Effect; Recent Climate Changes; Carbon Dioxide; Other Global Warming ''Forcing Agents''; Water Vapor; Methane; Nitrous Oxide; Ozone; Sulfur; Other Pollutants; Carbon-Based and Other Particulates; Solar Influences-Insolation and Irradiance; Global Net Primary Productivity (NPP); Intergovernmental Panel on Climate Change; IPCC Report Conclusions; Footnote on the IPCC 327 $aDealing with Global WarmingCan Anything Be Done?; The Kyoto Protocol; 2 The Hydrogen Economy (Aka, the Impossible Dream); The Promise of Hydrogen; The Scale of the Task-Why Replace Gasoline?; Replacing Fuels Other than Gasoline; Hydrogen as an Alternative Fuel; Hydrogen Production Methods; Water-Splitting Processes-Overview; Hydrogen from Electrolysis; Electrolytic Hydrogen Production; Oxygen By-products; Energy Consumption and Electrolyzer Efficiency; Electrolysis: Emissions; Electrolysis: Economics; Hydrogen from Hydrocarbons; Thermal and Catalytic Reforming from Natural Gas 327 $aCatalytic Thermochemical ReformingScaling Issues-Up and Down; Combustion CO(2) from Reforming; Hydrogen Production Costs; Natural Gas Reserves and Hydrogen; Natural Gas and Hydrogen Manufacture; Other Hydrogen Production Methods; Photoelectrolysis; Biomass Conversion to Hydrogen; Hydrogen Production-Summary; Safety Considerations; Transporting and Distributing Hydrogen; Compressing Hydrogen; Liquid Hydrogen; Pipelining Hydrogen; Pipeline Leakage Losses; Road Tanker Transportation of Hydrogen; Hydrogen Leakage Losses; Transportation and Distribution Alternatives 327 $aDistributed Manufacturing of HydrogenBy Electrolysis; By Reforming; Hydrogen Reformer Reliability; Hydrogen Reformer Safety; Onboard Manufacture of Hydrogen; Hydrogen Storage; Hydrogen Storage Approaches; Compressed Hydrogen Gas: Containment Technologies for 5000-10,000 psig; Liquid Hydrogen: Cryogenic Containment; Storage in Metals and Metal Hydrides; Background on Metal Hydrides; Complex Hydrides; Catalyzed Hydrogen Adsorption and/or Desorption; Feasibility of Metal Hydrides as Storage Media; Hydrogen Adsorption/Desorption: ''Chemical Hydrides'' 327 $aHydride Slurries for Hydrogen Storage and TransportationPossible Nonmetal Hydrides/Hydrogen Carriers; Hydrocarbons via Partial Dehydrogenation; Carbon-Based Adsorption Systems; Graphite; Graphitic Nanotubes; Zeolites; Novel Hydrogen Storage Methods; Hydrogen Carriers; Ammonia; Methanol; Hydrogen Storage and DOE Criteria; Storage Implications for Light-Duty Vehicles; Hydrogen Storage with No Gravimetric or Volumetric Capacity Constraints; Hydrogen Storage Assessment; Hydrogen Safety; Some Additional Safety Issues; Summary of Hydrogen Issues; 3 Nuclear Energy and the Plutonium Economy 327 $aThe Influence of Nuclear Energy 330 $aThis important new book presents a comprehensive review of practical alternative energy choices for the twenty-first century. It addresses three critical energy-related topics that are causing great confusion in public debate-global warming, the hydrogen economy, and nuclear power-and gives readers an opportunity to form a grounded, factually correct foundation for understanding the energy challenge and develop their own informed and actionable opinion. 606 $aPower resources 606 $aElectric power 615 0$aPower resources. 615 0$aElectric power. 676 $a333.79 686 $a83.65$2bcl 686 $a50.70$2bcl 700 $aWilson$b John R$0309776 701 $aBurgh$b Griffin$0911558 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910145425803321 996 $aEnergizing our future$92041383 997 $aUNINA LEADER 04486nam 22007455 450 001 9911015879403321 005 20250730020225.0 010 $a981-9690-98-6 024 7 $a10.1007/978-981-96-9098-5 035 $a(MiAaPQ)EBC32202186 035 $a(Au-PeEL)EBL32202186 035 $a(CKB)39620862400041 035 $a(DE-He213)978-981-96-9098-5 035 $a(EXLCZ)9939620862400041 100 $a20250709d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy $e30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14?16, 2025, Proceedings, Part II /$fedited by Willy Susilo, Josef Pieprzyk 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (674 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15659 311 08$a981-9690-97-8 327 $a -- Post-Quantum Cryptography. -- Towards Quantum Security of Hirose Compression Function and Romulus-H. -- Efficient Multi-instance Vector Commitment and Application to Post quantum Signatures. -- Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium. -- Efficient Revocable Identity-Based Encryption from Middle-Product LWE. -- Code-based Fully Dynamic Accountable Ring Signatures and Group Signatures using the Helper Methodology. -- Partial Key Exposure Attacks on UOV and Its Variants. -- Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWEBased Optimization. -- Fiat-Shamir with Rejection and Rotation. -- Amoeba: More Flexible RLWE-based KEM. -- Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-based Self-Comparison Oracle. -- Homomorphic Encryption and Applications. -- Accountability for Server Misbehavior in Homomorphic Secret Sharing. -- High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping. -- Refined Error Management for Gate Bootstrapping. -- Cryptographic Foundations and Number Theory. -- Compact Lifting for NTT-unfriendly Modulus. -- Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience. -- Solving Generalized Approximate Divisor Multiples Problems. 330 $aThis three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14?16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15659 606 $aData protection 606 $aComputer security 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aBlockchains (Databases) 606 $aData and Information Security 606 $aPrinciples and Models of Security 606 $aCryptology 606 $aPrivacy 606 $aMobile and Network Security 606 $aBlockchain 615 0$aData protection. 615 0$aComputer security. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 0$aBlockchains (Databases) 615 14$aData and Information Security. 615 24$aPrinciples and Models of Security. 615 24$aCryptology. 615 24$aPrivacy. 615 24$aMobile and Network Security. 615 24$aBlockchain. 676 $a005.8 700 $aSusilo$b Willy$01759814 701 $aPieprzyk$b Josef$0486892 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911015879403321 996 $aInformation Security and Privacy$94406540 997 $aUNINA