|
Showing 1 - 9 of
9 matches in All Departments
Reconfigurable RF-frontends aim to cope with the continuous pursuit
of wider frequency coverage, higher efficiency, further compactness
and lower cost of ownership. They are expected to lay the
foundations of future software defined or cognitive radios. As a
potential enabling technology for the frontends, the tunable
ferroelectric devices have shown not only enhanced performance but
also new functionalities. This book explores the recent
developments in the field. It provides a cross-sectional
perspective on the interdisciplinary research. With attention to
the devices based on ceramic thick-films and crystal thin-films,
the book reviews the adapted technologies of material synthesis,
film deposition and multilayer circuitry. Next, it highlights the
original classes of thin-film ferroelectric devices, including
stratified metal-insulator-metal varactors with suppression of
acoustic resonance and programmable bi-stable high frequency
capacitors. At the end the book analyzes how the frontends can be
reformed by tunable multiband antennas, tunable single- and
multiband impedance matching networks and tunable substrate
integrated waveguide filters, which are all built on low cost
ferroelectric thick-films. For all the above devices, the
theoretical analyses, modeling and design methods are elaborated,
while through demonstrative prototypes the application potential is
evaluated.
|
Information Security - 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings (Paperback, 2004 ed.)
Kan Zhang, Yuliang Zheng
|
R1,760
Discovery Miles 17 600
|
Ships in 10 - 15 working days
|
The 2004 Information Security Conference was the seventh in a
series that started with the Information Security Workshop in 1997.
A distinct feature of this series is the wide coverage of topics
with the aim of encouraging interaction between researchers in
di?erent aspects of information security. This trend c-
tinuedintheprogramofthisyear
sconference.Theprogramcommitteereceived 106 submissions, from which
36 were selected for presentation. Each submission was reviewed by
at least three experts in the relevant research area. We would
liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,
and
wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative
forum for their work. We were fortunate to have an energetic team
of experts who took on the task of the program committee. Their
names may be found overleaf, and we thank them warmly for their
time and e?orts. This team was helped by an even larger number of
external reviewers who reviewed papers in their particular areas of
expertise. A list of these names is also provided, which we hope is
complete. We would also like to thank the advisory committee for
their advice and s-
port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica
Staddon. We made use of the electronic submission and reviewing
software s- plied by COSIC at the Katholieke Universiteit Leuven.
Both the software and the ISC 2004 website were run on a server at
UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We
also appreciate assistance from Lawrence Teo in editing the
proceedings."
This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.
|
Public Key Cryptography - Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings (Paperback, 2000 ed.)
Hideki Imai, Yuliang Zheng
|
R1,787
Discovery Miles 17 870
|
Ships in 10 - 15 working days
|
ThePKC2000conferencewasheldattheMelbourneExhibitionCentre,
Victoria, Australia, January 18-20, 2000. It was the third
conference in the international workshop series dedicated to
practice and theory in public key cryptography. The program
committee of the conference received 70 full submissions from
around the world, of which 31 were selected for presentation. All
submissions were reviewed by experts in the relevant areas. The
program committee consisted of 19 experts in cryptography and data
se- rity drawn from the international research community, these
being Chin-Chen Chang (National Chung Cheng University, Taiwan),
Claude Cr epeau (McGill University, Canada), Ed Dawson (Queensland
University of Technology, A- tralia), Yvo Desmedt (Florida State
University, USA), Hideki Imai (Co-chair, UniversityofTokyo, Japan),
MarkusJakobsson(BellLabs, USA), KwangjoKim (Information and
Communications University, Korea), Arjen Lenstra (Citibank, USA),
TsutomuMatsumoto(YokohamaNationalUniversity, Japan), DavidN- cache
(Gemplus, France), Eiji Okamoto (University of Wisconsin-Milwaukee,
USA), TatsuakiOkamoto(NTTLabs, Japan), JosefPieprzyk(UniversityofW-
longong, Australia), Jean-Jacques Quisquater (Universit e
Catholique de L- vain, Belgium), Nigel Smart (HP Labs Bristol, UK),
Vijay Varadharajan (U- versity of Western Sydney, Australia), Serge
Vaudenay (Ecole Polytechnique F ed erale de Lausanne, Switzerland),
Moti Yung (CertCo, USA), and Yuliang Zheng (Co-chair, Monash
University, Australia). Members of the committee spent numerous
hours in reviewing the submissions and providing advice and
comments on the selection of paper
The 1999 International Information Security Workshop, ISW'99, was
held on Monash University's Malaysia Campus, which is about 20km to
the south west of downtown Kuala Lumpur, November 6-7, 1999.
ISW'99soughtadi erentgoalfromitspredecessor, ISW'97,
heldinIshikawa, Japan, whose proceedings were published as Volume
1396 of Springer Verlag's LNCS series. The focus of ISW'99 wason
the following emerging areasof imp- tance in information security:
multimedia watermarking, electronic cash, secure software
components and mobile agents, and protection of software.
Theprogramcommitteereceived38fullsubmissionsfrom12countriesand-
gions: Australia, China, France, Germany, Hong Kong, Japan, Korea,
Malaysia, Singapore, Spain, Taiwan, and USA, and selected 23 of
them for presentation. Among the 23 presentations, 19 were regular
talks and the remaining 4 were short talks. Each submission was
reviewed by at least two expert referees. We are grateful to the
members of the program committee for reviewing and selecting papers
in a very short period of time. Their comments helped the authors
improve the n al version of their papers. Our thanks also go to
Patrick McDaniel, Masaji Kawahara, and Yasuhiro Ohtaki who assisted
in reviewing papers. In addition, we would like to thank all the
authors, including those whose submissions were not accepted, for
their contribution to the success of this workshop. The workshop
was organized with the help of local committee members, - cluding
Cheang Kok Soon, Hiew Pang Leang, Lily Leong, and Robin Pollard.
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce.
This book constitutes the refereed proceedings of the First
International Workshop on Practice and Theory in Public Key
Cryptography, PKC'98, held in Pacifico Yokohama, Japan, in February
1998.
The volume presents four invited contributions together with 18
revised full papers selected from 30 submissions. The papers
address all current issues in research and design in the area
including digital signature schemes, digital payment systems,
electronic commerce, cryptographic protocols, as well as
foundational issues like integer factorization, elliptic curve
aspects, hash functions, finite fields, etc.
This book contains the proceedings of AUSCRYPT '92, an
international conference on cryptologic research held on the Gold
Coast, Australia, in December 1992. This is the third conference
held outside the series of CRYPTO meetings held in Santa Barbara,
California, each August and EUROCRYPT meetings held in European
countries each northern spring. The first two were AUSCRYPT '90,
held in Australia, and ASIACRYPT '91, held in Japan. The volume
contains three invited papers and 44 contributed papers selected
from 77 submissions. The articles cover all main topics in modern
computer and communications security research.These include: -
authentication - secret sharing - digital signatures - one-way
hashing functions - design of block ciphers - cryptanalysis -
cryptographic protocols - pseudo-random sequences and functions -
public key cryptography.
Reconfigurable RF-frontends aim to cope with the continuous pursuit
of wider frequency coverage, higher efficiency, further compactness
and lower cost of ownership. They are expected to lay the
foundations of future software defined or cognitive radios. As a
potential enabling technology for the frontends, the tunable
ferroelectric devices have shown not only enhanced performance but
also new functionalities. This book explores the recent
developments in the field. It provides a cross-sectional
perspective on the interdisciplinary research. With attention to
the devices based on ceramic thick-films and crystal thin-films,
the book reviews the adapted technologies of material synthesis,
film deposition and multilayer circuitry. Next, it highlights the
original classes of thin-film ferroelectric devices, including
stratified metal-insulator-metal varactors with suppression of
acoustic resonance and programmable bi-stable high frequency
capacitors. At the end the book analyzes how the frontends can be
reformed by tunable multiband antennas, tunable single- and
multiband impedance matching networks and tunable substrate
integrated waveguide filters, which are all built on low cost
ferroelectric thick-films. For all the above devices, the
theoretical analyses, modeling and design methods are elaborated,
while through demonstrative prototypes the application potential is
evaluated.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Unlimited Love
Red Hot Chili Peppers
CD
(1)
R226
R143
Discovery Miles 1 430
|