Browse Results

Showing 47,926 through 47,950 of 64,113 results

Public Interests: Media Advocacy and Struggles over U.S. Television

by Allison Perlman

Nearly as soon as television began to enter American homes in the late 1940s, social activists recognized that it was a powerful tool for shaping the nation's views. By targeting broadcast regulations and laws, both liberal and conservative activist groups have sought to influence what America sees on the small screen. Public Interests describes the impressive battles that these media activists fought and charts how they tried to change the face of American television. Allison Perlman looks behind the scenes to track the strategies employed by several key groups of media reformers, from civil rights organizations like the NAACP to conservative groups like the Parents Television Council. While some of these campaigns were designed to improve the representation of certain marginalized groups in television programming, as Perlman reveals, they all strove for more systemic reforms, from early efforts to create educational channels to more recent attempts to preserve a space for Spanish-language broadcasting. Public Interests fills in a key piece of the history of American social reform movements, revealing pressure groups' deep investments in influencing both television programming and broadcasting policy. Vividly illustrating the resilience, flexibility, and diversity of media activist campaigns from the 1950s onward, the book offers valuable lessons that can be applied to current battles over the airwaves.

Public Key Cryptography

by Lynn Margaret Batten

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. <P><P>It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based - such as the discrete logarithm problem and the difficulty of factoring integers. The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography: * Explains fundamentals of public key cryptography * Offers numerous examples and exercises * Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam * Provides solutions to the end-of-chapter problems Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.

Public Key Cryptosystems (Cyber Shorts)

by Esra Bas

This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary background, Chapters 1 and 2 are devoted to the selected fundamental concepts in cryptography mathematics and selected fundamental concepts in cryptography.Chapter 3 is devoted to discrete logarithm problem (DLP), DLP-related public key cryptosystems, digital signature algorithms, and their cryptanalysis. In this chapter, the elliptic curve counterparts of the algorithms and the basic algorithms for the solution of DLP are also given. In Chapter 4, RSA public key cryptosystem, RSA digital signature algorithm, the basic cryptanalysis approaches, and the integer factorization methods are provided. Chapter 5 is devoted to GGH and NTRU public key cryptosystems, GGH and NTRU digital signature algorithms, and the basic cryptanalysis approaches, whereas Chapter 6 covers other topics including knapsack cryptosystems, identity-based public key cryptosystems, identity-based digital signature algorithms, Goldwasser-Micali probabilistic public key cryptosystem, and their cryptanalysis.The book’s distinctive features: The book provides some fundamental mathematical and conceptual preliminaries required to understand the core parts of the book. The book comprises the selected public key cryptosystems, digital signature algorithms, and the basic cryptanalysis approaches for these cryptosystems and algorithms. The cryptographic algorithms and most of the solutions of the examples are provided in a structured table format to support easy learning. The concepts and algorithms are illustrated with examples, some of which are revisited multiple times to present alternative approaches. The details of the topics covered in the book are intentionally not presented; however, several references are provided at the end of each chapter so that the reader can read those references for more details.

Public Key Infrastructure: Building Trusted Applications and Web Services

by John R. Vacca

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce act

Public Library Collection Development in the Information Age

by Annabel Stephens

Public Library Collection Development in the Information Age discusses the increasing amounts of information that are used in collection development. Case studies, interviews, and research are the basis for this book's suggestions to improve your collection methods without straining your library's budget. It will help you acquire the most useful materials while sharing information with collaborating libraries to offer patrons the latest and largest variety of resources.Discussing a topic that is scarcely addressed in collection literature, this book explores ways in which one informational medium - the Internet - impacts materials budgets, selection tools, and alternative sources of information during the selection process.Offering methods that apply to libraries of different sizes and financial capability, Public Library Collection Development in the Information Age provides you with ideas and suggestions for the improvement of collection development methods, including: examining how libraries use information to plan and budget for collection development developing a budget method that takes several factors into consideration, such as population impact, property tax revenues, circulation, reference needs, and client needs centralizing selections in order to allocate additional staff time and to choose resources patrons want without sacrificing the utility of local collections building public library collections with the assistance of vendors and the five levels of vendor participation using the conspectus method to assess and organize the collections of small libraries for easier access researching three public libraries in the United Kingdom to determine how varying levels of automation affect patron resources and services To help you integrate the appropriate electronic resources into collection development policies and procedures, Public Library Collection Development in the Information Age discusses which formats, access methods, pricing schemes, and differences in scope will best meet your selection needs. Containing proven strategies that will target your collection priorities and criteria to evaluate the use and effectiveness of electronic resources, this book will help revise your collection development methods to satisfy the informational needs of patrons.

Public Opinion and Counter-Terrorism: Security and Politics in the UK (Routledge Critical Terrorism Studies)

by Michael Lister

This book examines the ways in which the views of the public inhabit the counter-terrorism policy space, with a focus on the UK case. Drawing insights from Critical Terrorism Studies, Critical Security Studies and studies of public opinion, the book develops an argument that the relationship between public opinion is complex, iterative and mutually instantiating. Rather than public opinion and counter-terrorism policy existing in a simple, uni-directional causal relationship, the book argues that whilst counter-terrorism policy actors are informed by public opinion, in important ways they also construct that very opinion. This argument is made through an empirical analysis of UK counter-terrorism policy. Drawing on primary research interviews with key counter-terrorism policy actors, and security professionals, as well as original analysis of parliamentary debates, the book demonstrates that rather than UK counter- terrorism politics being closed and elite-driven, there exists a complex, dialectical relationship between public opinion and both the making and the implementing of counter-terrorism policy. This book will be of much interest to students of critical terrorism studies, counter-terrorism, security studies, British politics and communication studies.

Public Opinion, Campaign Politics & Media Audiences: New Australian Perspectives

by Bridget Griffen-Foley Associate Professor Sean Scalmer

This timely book investigates the fascinating landscape of media-driven politics through the prisms of 'public opinion', political campaigning, and audiences.From Indigenous voting rights and climate change to talkback radio and right-wing populism, Public Opinion, Campaign Politics & Media Audiences showcases new research in political science, history and media studies. Contributors scrutinise the relationship between polls, party policy and voting behaviour, and evaluate the roles of oratory and the media in electioneering and political communication across Australia, Britain and the United States.The eight chapters are based on papers delivered at a symposium to honour Murray Goot FASSA, Emeritus Professor of Politics and International Relations, on his retirement from Macquarie University.

Public Policy Analytics: Code and Context for Data Science in Government (Chapman & Hall/CRC Data Science Series)

by Ken Steif

Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R. Each of the eight chapters provides a detailed case study, showing readers: how to develop exploratory indicators; understand ‘spatial process’ and develop spatial analytics; how to develop ‘useful’ predictive analytics; how to convey these outputs to non-technical decision-makers through the medium of data visualization; and why, ultimately, data science and ‘Planning’ are one and the same. A graduate-level introduction to data science, this book will appeal to researchers and data scientists at the intersection of data analytics and public policy, as well as readers who wish to understand how algorithms will affect the future of government.

Public Relations and the Rise of AI

by Regina Luttrell Adrienne A. Wallace

This book explores the potential of artificial intelligence (AI) to transform public relations (PR) and offers guidance on maintaining authenticity in this new era of communication.One of the main challenges PR educators, researchers, and practitioners face in the AI era is the potential for miscommunication or unintended consequences of using AI tools. This volume provides insights on how to mitigate these risks and ensure that PR strategies are aligned, offering practical guidance on maintaining trust and authenticity in PR practices. Readers will learn to leverage AI for enhanced communication strategies and real-time audience engagement while navigating the ethical and legal implications of AI in PR. Featuring contributions from leading scholars, the book includes case studies and examples of AI-driven PR practices, showcasing innovative approaches and lessons from well-known brands. It offers a global perspective on AI’s impact on PR, with insights for practitioners and scholars worldwide.This book equips public relations educators, researchers, and professionals with the knowledge and tools they need in the changing landscape of communication in the age of AI.

Public Relations und Entscheidung: Zur kommunikativen Form der PR im digitalen Zeitalter (Organisationskommunikation)

by Anke Oßwald

Anke Oßwald entwickelt in dem vorliegenden Buch eine entscheidungsorientierte Perspektive auf Public Relations. Aufbauend auf einem systemtheoretischen Kommunikationsverständnis konzipiert sie PR als spezifische Entscheidungspraxis und zeigt, welche weitergehenden Erkenntnismöglichkeiten damit verbunden sind. So lassen sich unter anderem Automatisierungsprozesse deutlich differenzierter darstellen und die Folgen für Öffentlichkeit diskutieren. Neue Impulse ergeben sich auch für die Schnittstelle von PR- und Organisationsstudien sowie für die kommunikationswissenschaftlich ausgerichtete Strategieforschung.

Public Response to Alerts and Warnings on Mobile Devices: Summary of a Workshop on Current Knowledge and Research Gaps

by National Research Council of the National Academies

This book presents a summary of the Workshop on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Gaps, held April 13 and 14, 2010, in Washington, D.C., under the auspices of the National Research Council's Committee on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Needs. The workshop was structured to gather inputs and insights from social science researchers, technologists, emergency management professionals, and other experts knowledgeable about how the public responds to alerts and warnings, focusing specifically on how the public responds to mobile alerting.

Public Sector Transformation through E-Government: Experiences from Europe and North America (Routledge Studies in Innovation, Organizations and Technology)

by Christopher G. Reddick Vishanth Weerakkody

Over the last decade governments in Europe and North America have attempted to improve efficiency of public services through Information and Communication Technology, commonly branded as electronic government (e-government). Public Sector Transformation through E-Government explores the influence that e-government has on public sector organizations, the organizational complexities that result, and its impact on citizens and democratic society. This book examines e-government’s potential to transform public services from a theoretical perspective, and provides practical examples from leading public sector institutions that have utilized e-government as a basis to bring about change. It further investigates the relationship between citizens and government and how they are affected by e-government policies and programs. Aimed at students and researchers of public administration/management and information systems, this book serves as a welcome tool for examining and understanding e-government and transformational change.

Public Service Broadcasting Online

by Benedetta Brevini

This book investigates the extent to which a Public Service Broadcasting (PSB) ethos has been extended to the online world in Europe. It examines the most significant policy initiatives carried out by PSBs in Europe on online platforms, and analyzes how the public service philosophy is being reinvented by policy makers.

Public Spheres and Mediated Social Networks in the Western Context and Beyond

by Mark Wheeler Petros Iosifidis

Social media is said to radically change the way in which public communication takes place: information diffuses faster and can reach a large number of people, but what makes the process so novel is that online networks can empower people to compete with traditional broadcasters or public figures. This book critically interrogates the contemporary relevance of social networks as a set of economic, cultural and political enterprises and as a public sphere in which a variety of political and socio-cultural demands can be met. It examines policy, regulatory and socio-cultural issues arising from the transformation of communication to a multi-layered sphere of online and social networks. The central theme of the book is to address the following questions: Are online and social networks an unstoppable democratizing and mobilizing force? Is there a need for policy and intervention to ensure the development of comprehensive and inclusive social networking frameworks? Social media are viewed both as a tool that allows citizens to influence policymaking, and as an object of new policies and regulations, such as data retention, privacy and copyright laws, around which citizens are mobilizing.

Public Transport Optimization

by Konstantinos Gkiotsalitis

This textbook provides a comprehensive step-by-step guide for new public transport modelers. It includes an introduction to mathematical modeling, continuous and discrete optimization, numerical optimization, computational complexity analysis, metaheuristics, and multi-objective optimization. These tools help engineers and modelers to use better existing public transport models and also develop new models that can address future challenges. By reading this book, the reader will gain the ability to translate a future problem description into a mathematical model and solve it using an appropriate solution method.The textbook provides the knowledge needed to develop highly accurate mathematical models that can serve as decision support tools at the strategic, tactical, and operational planning levels of public transport services. Its detailed description of exact optimization methods, metaheuristics, bi-level, and multi-objective optimization approaches together with the detailed description of implementing these approaches in classic public transport problems with the use of open source tools is unique and will be highly useful to students and transport professionals.

Public-Key Cryptography - PKC 2016

by Chen-Mou Cheng Kai-Min Chung Giuseppe Persiano Bo-Yin Yang

Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016. The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named: CCA security,functional encryption, identity-based encryption, signatures, cryptanalysis,leakage-resilient and circularly secure encryption, protocols, and primitives.

Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9614)

by Chen-Mou Cheng Kai-Min Chung Giuseppe Persiano Bo-Yin Yang

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016.The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.

Public-Key Cryptography – PKC 2018: 21st Iacr International Conference On Practice And Theory Of Public-key Cryptography, Rio De Janeiro, Brazil, March 25-29, 2018, Proceedings (Lecture Notes in Computer Science #10770)

by Michel Abdalla Ricardo Dahab

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

Public-Key Cryptography – PKC 2018: 21st Iacr International Conference On Practice And Theory Of Public-key Cryptography, Rio De Janeiro, Brazil, March 25-29, 2018, Proceedings (Lecture Notes in Computer Science #10770)

by Michel Abdalla Ricardo Dahab

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11442)

by Dongdai Lin Kazue Sako

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​

Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11442)

by Dongdai Lin Kazue Sako

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​

Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11443)

by Dongdai Lin Kazue Sako

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​

Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12110)

by Vassilis Zikas Aggelos Kiayias Markulf Kohlweiss Petros Wallden

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Public-Key Cryptography – PKC 2020: 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12111)

by Vassilis Zikas Aggelos Kiayias Markulf Kohlweiss Petros Wallden

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12710)

by Juan A. Garay

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.The 52 papers included in these proceedings were carefully reviewed and selected from 156 submissions. They focus on all aspects of public-key cryptography, covering theory, implementations and applications. This year, post-quantum cryptography, PQC constructions and cryptanalysis received special attention.

Refine Search

Showing 47,926 through 47,950 of 64,113 results