Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
Complex Lie groups have often been used as auxiliaries in the study of real Lie groups in areas such as differential geometry and representation theory. To date, however, no book has fully explored and developed their structural aspects.
Complex Lie groups have often been used as auxiliaries in the study of real Lie groups in areas such as differential geometry and representation theory. To date, however, no book has fully explored and developed their structural aspects. The Structure of Complex Lie Groups addresses this need. Self-contained, it begins with general concepts introduced via an almost complex structure on a real Lie group. It then moves to the theory of representative functions of Lie groups- used as a primary tool in subsequent chapters-and discusses the extension problem of representations that is essential for studying the structure of complex Lie groups. This is followed by a discourse on complex analytic groups that carry the structure of affine algebraic groups compatible with their analytic group structure. The author then uses the results of his earlier discussions to determine the observability of subgroups of complex Lie groups. The differences between complex algebraic groups and complex Lie groups are sometimes subtle and it can be difficult to know which aspects of algebraic group theory apply and which must be modified. The Structure of Complex Lie Groups helps clarify those distinctions. Clearly written and well organized, this unique work presents material not found in other books on Lie groups and serves as an outstanding complement to them.
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.
This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.
This book constitutes the proceedings of the 26th International Conference on Computing and Combinatorics, COCOON 2020, held in Atlanta, GA, USA, in August 2020. Due to the COVID-19 pandemic COCOON 2020 was organized as a fully online conference. The 54 papers presented in this volume were carefully reviewed and selected from 126 submissions. The papers cover various topics, including algorithm design, approximation algorithm, graph theory, complexity theory, problem solving, optimization, computational biology, computational learning, communication network, logic, and game theory.
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.
|
You may like...
|