|
Showing 1 - 25 of
25 matches in All Departments
The Other Classical Musics offers challenging new perspectives on
classical music by presenting the history of fifteen parallel
traditions. Winner of the Royal Philharmonic Society Music Award
for Creative Communication 2015 There is a treasure trove of
underappreciated music out there; this book will convince many to
explore it. The Economist Whatis classical music? This book answers
the question in a manner never before attempted, by presenting the
history of fifteen parallel traditions, of which Western classical
music is just one. Each music is analysed in terms of itsmodes,
scales, and theory; its instruments, forms, and aesthetic goals;
its historical development, golden age, and condition today; and
the conventions governing its performance. The writers are leading
ethnomusicologists, and their approach is based on the belief that
music is best understood in the context of the culture which gave
rise to it. By including Mande and Uzbek-Tajik music - plus North
American jazz - in addition to the better-knownstyles of the Middle
East, the Indian sub-continent, the Far East, and South-East Asia,
this book offers challenging new perspectives on the word
'classical'. It shows the extent to which most classical traditions
are underpinnedby improvisation, and reveals the cognate origins of
seemingly unrelated musics; it reflects the multifarious ways in
which colonialism, migration, and new technology have affected
musical development, and continue to do today. With specialist
language kept to a minimum, it's designed to help both students and
general readers to appreciate musical traditions which may be
unfamiliar to them, and to encounter the reality which lies behind
that lazy adjective'exotic'. MICHAEL CHURCH has spent much of his
career in newspapers as a literary and arts editor; since 2010 he
has been the music and opera critic of The Independent. From 1992
to 2005 he reported on traditional musics all over the world for
the BBC World Service; in 2004, Topic Records released a CD of his
Kazakh field recordings and, in 2007, two further CDs of his
recordings in Georgia and Chechnya. Contributors: Michael Church,
Scott DeVeaux, Ivan Hewett, David W. Hughes, Jonathan Katz, Roderic
Knight, Frank Kouwenhoven, Robert Labaree, Scott Marcus, Terry E.
Miller, Dwight F. Reynolds, Neil Sorrell, Will Sumits, Richard
Widdess, Ameneh Youssefzadeh
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
As a beginning graduate student, I recall being frustrated by a
general lack of acces sible sources from which I could learn about
(theoretical) cryptography. I remember wondering: why aren't there
more books presenting the basics of cryptography at an introductory
level? Jumping ahead almost a decade later, as a faculty member my
graduate students now ask me: what is the best resource for
learning about (various topics in) cryptography? This monograph is
intended to serve as an answer to these 1 questions - at least with
regard to digital signature schemes. Given the above motivation,
this book has been written with a beginninggraduate student in
mind: a student who is potentially interested in doing research in
the ?eld of cryptography, and who has taken an introductory course
on the subject, but is not sure where to turn next. Though intended
primarily for that audience, I hope that advanced graduate students
and researchers will ?nd the book useful as well. In addition to
covering various constructions of digital signature schemes in a
uni?ed framework, this text also serves as a compendium of various
"folklore" results that are, perhaps, not as well known as they
should be. This book could also serve as a textbook for a graduate
seminar on advanced cryptography; in such a class, I expect the
entire book could be covered at a leisurely pace in one semester
with perhaps some time left over for excursions into related
topics.
This book constitutes the refereed proceedings of the 5th
International Conference on Applied Cryptography and Network
Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31
revised full papers cover signature schemes, computer and network
security, cryptanalysis, group-oriented security, cryptographic
protocols, anonymous authentication, identity-based cryptography,
and security in wireless, ad-hoc, and peer-to-peer networks.
Now the most used texbook for introductory cryptography courses in
both mathematics and computer science, the Third Edition builds
upon previous editions by offering several new sections, topics,
and exercises. The authors present the core principles of modern
cryptography, with emphasis on formal definitions, rigorous proofs
of security.
The arrival in 1909 of the library of manuscripts now known as the
Chandra Shum Shere collection increased by well over six thousand
the already substantial holdings of the Bodleian and Indian
Institute libraries, and made Oxford the repository of the largest
known collection of Sanskrit manuscripts outside the Indian
subcontinent. It is a huge and uniquely valuable collection of
paper and palm leaf manuscripts, purchased for Oxford University by
Sir Chandra Shum Shere, the then Prime Minister of Nepal. The
General Editor of the catalogue of the collection is Dr Jonathan
Katz, Consultant to the Oriental Department of the Bodleian
Library, formerly Librarian of the Indian Institute, and present
Master of the Queen's Scholars at Westminster School.
|
Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback, 1st ed. 2022)
Shlomi Dolev, Jonathan Katz, Amnon Meisels
|
R2,522
Discovery Miles 25 220
|
Ships in 12 - 17 working days
|
This book constitutes the refereed proceedings of the 6th
International Symposium on Cyber Security Cryptography and Machine
Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July
2022. The 24 full and 11 short papers presented together with a
keynote paper in this volume were carefully reviewed and selected
from 53 submissions. They deal with the theory, design, analysis,
implementation, or application of cyber security, cryptography and
machine learning systems and networks, and conceptually innovative
topics in these research areas.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R2,940
Discovery Miles 29 400
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R2,922
Discovery Miles 29 220
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
|
R2,916
Discovery Miles 29 160
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403,
constitutes the refereed proceedings of the 37th Annual
International Cryptology Conference, CRYPTO 2017, held in Santa
Barbara, CA, USA, in August 2017. The 72 revised full papers
presented were carefully reviewed and selected from 311
submissions. The papers are organized in the following topical
sections: functional encryption; foundations; two-party
computation; bitcoin; multiparty computation; award papers;
obfuscation; conditional disclosure of secrets; OT and ORAM;
quantum; hash functions; lattices; signatures; block ciphers;
authenticated encryption; public-key encryption, stream ciphers,
lattice crypto; leakage and subversion; symmetric-key crypto, and
real-world crypto.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,593
Discovery Miles 15 930
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R3,335
Discovery Miles 33 350
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
|
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Matthew Robshaw, Jonathan Katz
|
R1,587
Discovery Miles 15 870
|
Ships in 10 - 15 working days
|
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816,
constitutes the refereed proceedings of the 36th Annual
International Cryptology Conference, CRYPTO 2016, held in Santa
Barbara, CA, USA, in August 2016. The 70 revised full papers
presented were carefully reviewed and selected from 274
submissions. The papers are organized in the following topical
sections: provable security for symmetric cryptography; asymmetric
cryptography and cryptanalysis; cryptography in theory and
practice; compromised systems; symmetric cryptanalysis; algorithmic
number theory; symmetric primitives; asymmetric cryptography;
symmetric cryptography; cryptanalytic tools; hardware-oriented
cryptography; secure computation and protocols; obfuscation;
quantum techniques; spooky encryption; IBE, ABE, and functional
encryption; automated tools and synthesis; zero knowledge; theory.
This book constitutes the refereed proceedings of the 18th
International Conference on Practice and Theory in Public-Key
Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in
March/April 2015. The 36 papers presented in this volume were
carefully reviewed and selected from 118 submissions. They are
organized in topical sections named: public-key encryption; e-cash;
cryptanalysis; digital signatures; password-based authentication;
pairint-based cryptography; efficient constructions; cryptography
with imperfect keys; interactive proofs; lattice-based
cryptography; and identity-based, predicate, and functional
encryption.
This third volume of the catalogue contains descriptive entries for over five hundred manuscripts of Sanskrit hymnic and devotional poems, running to nearly seven hundred separate compositions in manuscripts running from the sixteenth to the nineteenth century. This important genre of classical Indian literature is valuable not only for its intrinsic poetic and aesthetic merits but also as a vital source of information for the history of Indian religion and its numerous traditions and affiliations. The collection includes works of famous devotional poets and philosophers as well as nearly two hundred compositions whose authors are unknown including some for which there are no other known available manuscripts in any other libraries. Professor Aithal is an internationally renowned expert in the field, and his descriptions include details of scribal and palaeographic features; his useful introduction outlines the literary genre and the principles of its classification.
The Chandra Shum Shere Collection, which arrived in Oxford from
Varanasi over a century ago, is one of the largest Indian
manuscript libraries in the world outside the Subcontinent. Part IV
of this descriptive catalogue adds much to our knowledge of the
collection as a whole and gives details of nearly 900 manuscripts
in the field of Vedic literature, a fine and varied corpus of
Sanskrit primary texts and commentaries. There are some indications
that the original owner of this collection was a ritualist with
interests both in sacrificial practice and in traditional Vedic
scholarship. This element of the collection brings the published
catalogue records near to the half-way point, and other subject
volumes are present in preparation. Catalogue entries give full
information of the coverage of the nature and extent of the texts,
materials, scripts, scribes, dates and places of writing, and
former owners of the manuscripts.
|
Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Paperback, 2011 ed.)
John S. Baras, Jonathan Katz, Eitan Altman
|
R1,821
Discovery Miles 18 210
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second
International Conference on Decision and Game Theory for Security,
GameSec 2011, held in College Park, Maryland, USA, in November
2011. The 16 revised full papers and 2 plenary keynotes presented
were carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on attacks, adversaries,
and game theory, wireless adhoc and sensor networks, network games,
security insurance, security and trust in social networks and
security investments.
Cloud services have revolutionized computing in the modern world.
In an increasingly networked ecosystem, it is commonplace for
enterprises and private parties alike to leverage cloud services
for storage and compute. The most obvious benefits include
scalability, increased availability, and the potential for reduced
costs when compared to lower-scale on premise infrastructures. In
addition, cloud-hosted data (and compute) is accessible across
platforms and is not limited by geographical constraints making
collaboration attractively viable. However, the benefits of
outsourcing data and computation come with security and privacy
concerns. This monograph explores the advances in cloud security
research across both industry and academia, with a special focus on
secure infrastructure, services and storage. Besides overviewing
the state of the art, the monograph highlights open problems, and
possible future research directions. Cloud security is a broad
topic encompassing concepts from a large cross section of domains.
To make this monograph concise and meaningful, several topics and
challenges that are almost entirely specific to clouds are covered.
For this reason, general computing security topics such as
intrusion detection, software protection, phishing etc. are
excluded. While these are important building blocks that need to be
considered in an end-to-end cloud-centric design, they have been
extensively addressed elsewhere. The publication is divided into
three parts based on a broad clustering into hardware, computation,
and storage. The monograph should appeal to researchers, students
and professionals who work on Cloud Computing in general, and Cloud
Security specifically.
Before, During, and After Stonewall: 100 Years of Heroes and
History The Right Side of History tells the 100-year history of
queer activism in a series of revealing close-ups, first-person
accounts, and intimate snapshots of LGBT pioneers and radicals.
This diverse cast stretches from the Edwardian period to today,
including first-person accounts of the key protest that is at the
heart of the 2015 movie Stonewall. The book shows how LGBT folk
have always been in the forefront of progressive social evolution
in the United States. It references heroes like Abraham Lincoln,
Eleanor Roosevelt, Bayard Rustin, Harvey Milk, and Edie Windsor.
Equally, the book honors names that aren't in history books, from
participants in the Names Project, a national phenomenon
memorializing 94,000 AIDS victims, to underground artists and
writers.
|
|