0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (7)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Tunable Multiband Ferroelectric Devices for Reconfigurable RF-Frontends (Hardcover, 2013 ed.): Yuliang Zheng Tunable Multiband Ferroelectric Devices for Reconfigurable RF-Frontends (Hardcover, 2013 ed.)
Yuliang Zheng
R3,225 Discovery Miles 32 250 Ships in 12 - 17 working days

Reconfigurable RF-frontends aim to cope with the continuous pursuit of wider frequency coverage, higher efficiency, further compactness and lower cost of ownership. They are expected to lay the foundations of future software defined or cognitive radios. As a potential enabling technology for the frontends, the tunable ferroelectric devices have shown not only enhanced performance but also new functionalities. This book explores the recent developments in the field. It provides a cross-sectional perspective on the interdisciplinary research. With attention to the devices based on ceramic thick-films and crystal thin-films, the book reviews the adapted technologies of material synthesis, film deposition and multilayer circuitry. Next, it highlights the original classes of thin-film ferroelectric devices, including stratified metal-insulator-metal varactors with suppression of acoustic resonance and programmable bi-stable high frequency capacitors. At the end the book analyzes how the frontends can be reformed by tunable multiband antennas, tunable single- and multiband impedance matching networks and tunable substrate integrated waveguide filters, which are all built on low cost ferroelectric thick-films. For all the above devices, the theoretical analyses, modeling and design methods are elaborated, while through demonstrative prototypes the application potential is evaluated.

Tunable Multiband Ferroelectric Devices for Reconfigurable RF-Frontends (Paperback, 2013 ed.): Yuliang Zheng Tunable Multiband Ferroelectric Devices for Reconfigurable RF-Frontends (Paperback, 2013 ed.)
Yuliang Zheng
R3,207 Discovery Miles 32 070 Ships in 10 - 15 working days

Reconfigurable RF-frontends aim to cope with the continuous pursuit of wider frequency coverage, higher efficiency, further compactness and lower cost of ownership. They are expected to lay the foundations of future software defined or cognitive radios. As a potential enabling technology for the frontends, the tunable ferroelectric devices have shown not only enhanced performance but also new functionalities. This book explores the recent developments in the field. It provides a cross-sectional perspective on the interdisciplinary research. With attention to the devices based on ceramic thick-films and crystal thin-films, the book reviews the adapted technologies of material synthesis, film deposition and multilayer circuitry. Next, it highlights the original classes of thin-film ferroelectric devices, including stratified metal-insulator-metal varactors with suppression of acoustic resonance and programmable bi-stable high frequency capacitors. At the end the book analyzes how the frontends can be reformed by tunable multiband antennas, tunable single- and multiband impedance matching networks and tunable substrate integrated waveguide filters, which are all built on low cost ferroelectric thick-films. For all the above devices, the theoretical analyses, modeling and design methods are elaborated, while through demonstrative prototypes the application potential is evaluated.

Information Security - 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings... Information Security - 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Paperback, 2004 ed.)
Kan Zhang, Yuliang Zheng
R1,657 Discovery Miles 16 570 Ships in 10 - 15 working days

The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions, and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings."

Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings (Paperback, 2002 ed.)
Yuliang Zheng
R1,738 Discovery Miles 17 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.

Public Key Cryptography - Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne,... Public Key Cryptography - Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings (Paperback, 2000 ed.)
Hideki Imai, Yuliang Zheng
R1,683 Discovery Miles 16 830 Ships in 10 - 15 working days

ThePKC2000conferencewasheldattheMelbourneExhibitionCentre, Victoria, Australia, January 18-20, 2000. It was the third conference in the international workshop series dedicated to practice and theory in public key cryptography. The program committee of the conference received 70 full submissions from around the world, of which 31 were selected for presentation. All submissions were reviewed by experts in the relevant areas. The program committee consisted of 19 experts in cryptography and data se- rity drawn from the international research community, these being Chin-Chen Chang (National Chung Cheng University, Taiwan), Claude Cr epeau (McGill University, Canada), Ed Dawson (Queensland University of Technology, A- tralia), Yvo Desmedt (Florida State University, USA), Hideki Imai (Co-chair, UniversityofTokyo, Japan), MarkusJakobsson(BellLabs, USA), KwangjoKim (Information and Communications University, Korea), Arjen Lenstra (Citibank, USA), TsutomuMatsumoto(YokohamaNationalUniversity, Japan), DavidN- cache (Gemplus, France), Eiji Okamoto (University of Wisconsin-Milwaukee, USA), TatsuakiOkamoto(NTTLabs, Japan), JosefPieprzyk(UniversityofW- longong, Australia), Jean-Jacques Quisquater (Universit e Catholique de L- vain, Belgium), Nigel Smart (HP Labs Bristol, UK), Vijay Varadharajan (U- versity of Western Sydney, Australia), Serge Vaudenay (Ecole Polytechnique F ed erale de Lausanne, Switzerland), Moti Yung (CertCo, USA), and Yuliang Zheng (Co-chair, Monash University, Australia). Members of the committee spent numerous hours in reviewing the submissions and providing advice and comments on the selection of paper

Information Security - Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings... Information Security - Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings (Paperback, 1999 ed.)
Masahiro Mambo, Yuliang Zheng
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

The 1999 International Information Security Workshop, ISW'99, was held on Monash University's Malaysia Campus, which is about 20km to the south west of downtown Kuala Lumpur, November 6-7, 1999. ISW'99soughtadi erentgoalfromitspredecessor, ISW'97, heldinIshikawa, Japan, whose proceedings were published as Volume 1396 of Springer Verlag's LNCS series. The focus of ISW'99 wason the following emerging areasof imp- tance in information security: multimedia watermarking, electronic cash, secure software components and mobile agents, and protection of software. Theprogramcommitteereceived38fullsubmissionsfrom12countriesand- gions: Australia, China, France, Germany, Hong Kong, Japan, Korea, Malaysia, Singapore, Spain, Taiwan, and USA, and selected 23 of them for presentation. Among the 23 presentations, 19 were regular talks and the remaining 4 were short talks. Each submission was reviewed by at least two expert referees. We are grateful to the members of the program committee for reviewing and selecting papers in a very short period of time. Their comments helped the authors improve the n al version of their papers. Our thanks also go to Patrick McDaniel, Masaji Kawahara, and Yasuhiro Ohtaki who assisted in reviewing papers. In addition, we would like to thank all the authors, including those whose submissions were not accepted, for their contribution to the success of this workshop. The workshop was organized with the help of local committee members, - cluding Cheang Kok Soon, Hiew Pang Leang, Lily Leong, and Robin Pollard.

Public Key Cryptography - Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99,... Public Key Cryptography - Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999, Proceedings (Paperback, 1999 ed.)
Hideki Imai, Yuliang Zheng
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce.

Public Key Cryptography - First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico... Public Key Cryptography - First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings (Paperback, 1998 ed.)
Hideki Imai, Yuliang Zheng
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, held in Pacifico Yokohama, Japan, in February 1998.
The volume presents four invited contributions together with 18 revised full papers selected from 30 submissions. The papers address all current issues in research and design in the area including digital signature schemes, digital payment systems, electronic commerce, cryptographic protocols, as well as foundational issues like integer factorization, elliptic curve aspects, hash functions, finite fields, etc.

Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast,... Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings (Paperback, 1993 ed.)
Jennifer Seberry, Yuliang Zheng
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Be Still And Know That I Am God Pet…
Paperback R35 R29 Discovery Miles 290
The Folk Of The Air: Trilogy - The Cruel…
Holly Black Paperback  (3)
R648 Discovery Miles 6 480
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Klein Beertjie Ontmoet vir Baba Jesus
Bob Hartman Paperback R35 R29 Discovery Miles 290
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010
Dog Man: The Scarlet Shedder
Dav Pilkey Hardcover R420 R328 Discovery Miles 3 280
Rogz Indoor 3D Pod Dog Bed (Petrol/Grey…
R1,775 R889 Discovery Miles 8 890
Cable Guy Ikon "Light Up" Deadpool…
R599 R549 Discovery Miles 5 490
Tesa Sensitive Surfaces Adhesive Nail…
R169 Discovery Miles 1 690
Croxley CREATE Fibre Tip Khokis (12…
R44 R37 Discovery Miles 370

 

Partners