- Table View
- List View
Applied Crisis Communication and Crisis Management: Cases and Exercises
by Timothy CoombsDesigned to give students and public relations professionals the knowledge and skills they need to become successful crisis managers, Applied Crisis Communication and Crisis Management: Cases and Exercises by W. Timothy Coombs, includes a wide range of cases that explore crisis communication and management in action using a practical approach. In the first two chapters, the author introduces key theories and principles in crisis communication, which students apply by analyzing 17 cases drawn from recent headlines. Cases are explored from pre-crisis, mid-crisis, and post-crisis communication perspectives, and include a range of predominant crisis scenarios from product recalls to lawsuits to environmental disasters.
Applied Critical Leadership in Education: Choosing Change
by Lorri J. Santamaría Andrés P. SantamaríaEducational leaders are seeing the increasing need for practical transformative models and theories to address academic, cultural, and socio-economic gaps separating learners at all levels of the educational system. Applied Critical Leadership in Education explores a leadership model arising from critical theory and critical pedagogy traditions that transforms status quo educational practices. Providing a range of diverse voices of practicing leaders from prekindergarten through higher education, explicit ties to theory and practice are drawn, making leadership for social justice accessible, feasible, and more practical for aspiring and practicing leaders alike. Features Included: Case Studies provide examples of applied critical leadership across early childhood education, elementary school, middle school, high school, district, and higher education levels. Theory to Research Applications offer frameworks and key research complementary to cases. Checking In presents questions to the reader to respond and further engage with the chapter content. Opportunity Recognition and Critical Conversations offer strategies to challenge assumptions of common practices and begin conversations around issues of social justice. Backpack includes online or print resources to supplement the material in each chapter. Appendix provides a comprehensive example of qualitative case study research from design, to data collection, and analysis. Applied Critical Leadership in Education provides an innovative way for aspiring and practicing educational leaders to think about and apply leadership practice suited for the educational challenges of today that are necessary for change.
Applied Crop Physiology: Understanding the Fundamentals of Grain Crop Management
by Dennis EgliThis book presents a simple, straightforward discussion of the principles and processes involved in the production of grain yield by agronomic crops, and how these processes underlie and influence management decisions. The focus is on grain crops, principally maize and soybean, although the general principles apply equally well to cereals, grain legumes and oil crops. Management decisions define all cropping systems - what (crop species, variety), where (climate), when (planting date), and how (row spacing and population density) are the fundamental choices. Knowledge of the fundamental processes responsible for plant growth and the accumulation of yield simplifies the decision-making process and leads to improved management decisions, higher grain yields, and cropping systems that are efficient, resilient and sustainable. The contents include: · Basic plant growth processes e.g. photosynthesis, respiration, evapotranspiration · Growth and production of yield · Crop management - seed quality, variety selection, plant date, row spacing · Crop production in the future - climate change, GMOs, precision data and new crops Intended for researchers in crop science, agronomy and plant science, and crop production practitioners, this book will enable readers to make better, more informed management decisions; decisions that will help maintain a well-fed world in the future.
Applied Cross-Coupling Reactions (Lecture Notes in Chemistry #80)
by Yasushi Nishihara"Applied Cross-Coupling Reactions" provides students and teachers of advanced organic chemistry with an overview of the history, mechanisms and applications of cross-coupling reactions. Since the discovery of the transition-metal-catalyzed cross-coupling reactions in 1972, numerous synthetic uses and industrial applications have been developed. The mechanistic studies of the cross-coupling reactions have disclosed that three fundamental reactions: oxidative addition, transmetalation, and reductive elimination, are involved in a catalytic cycle. Cross-coupling reactions have allowed us to produce a variety of compounds for industrial purposes, such as natural products, pharmaceuticals, liquid crystals and conjugate polymers for use in electronic devices. Indeed, the Nobel Prize for Chemistry in 2010 was awarded for work on cross-coupling reactions. In this book, the recent trends in cross-coupling reactions are also introduced from the point of view of synthesis design and catalytic activities of transition-metal catalysts.
Applied Crowd Science
by G. Keith StillApplied Crowd Science outlines the theory and applications of the crowd safety course that Prof. Keith Still has developed and taught worldwide for over thirty years. It includes the background and applications of the crowd risk assessment tools, as well as essays and case studies from international users (UK, Ireland, Canada, Australia, Holland, Belgium and Japan). Keith’s courses are mandatory training for all UK Police Public Event Commanders. The text covers legislation and guidance for crowd safety in places of public assembly, and outlines the requirements of a crowd risk assessment for mass gatherings. It draws on Prof. Still’s expert witness experience, highlighting both the problems you need to understand for your event planning.
Applied Cryptography: Protocols, Algorithms and Source Code in C
by Bruce SchneierFrom the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.
Applied Cryptography and Network Security: 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13269)
by Giuseppe Ateniese Daniele VenturiThe LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 174 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12146)
by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo SpognardiThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12147)
by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo SpognardiThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9092)
by Tal Malkin Vladimir Kolesnikov Allison Bishop Lewko Michalis PolychronakisThis book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Lecture Notes in Computer Science #10355)
by Atsuko Miyaji Dieter Gollmann Hiroaki KikuchiThis book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14585)
by Christina Pöpper Lejla BatinaThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14584)
by Christina Pöpper Lejla BatinaThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14583)
by Christina Pöpper Lejla BatinaThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Lecture Notes in Computer Science #10892)
by Bart Preneel Frederik VercauterenThis book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.
Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (Lecture Notes in Computer Science #9696)
by Ahmad-Reza Sadeghi Mark Manulis Steve SchneiderThis book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.
Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12727)
by Kazue Sako Nils Ole TippenhauerThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12726)
by Kazue Sako Nils Ole TippenhauerThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I (Lecture Notes in Computer Science #13905)
by Mehdi Tibouchi XiaoFeng WangThe LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part II (Lecture Notes in Computer Science #13906)
by Mehdi Tibouchi XiaoFeng WangThe LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.
Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11464)
by Moti Yung Robert H. Deng Valérie Gauthier-Umaña Martín OchoaThis book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.
Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14586)
by Martin AndreoniThis two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024. The 33 full papers and 11 poster papers presented in this volume were carefully reviewed and selected from 62 submissions. They stem from the following workshops: 6th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2024). 5th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). 6th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2024). 5th ACNS Workshop on Secure Cryptographic Implementation (SCI 2024). 1st Workshop on Advances in Asymmetric Cryptanalysis (AAC 2024). 6th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2024). 1st Workshop on Low-Latency Encryption (LLE 2024). 4th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2024).
Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14587)
by Martin AndreoniThis two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024. The 33 full papers and 11 poster papers presented in this volume were carefully reviewed and selected from 62 submissions. They stem from the following workshops: 6th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2024). 5th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). 6th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2024). 5th ACNS Workshop on Secure Cryptographic Implementation (SCI 2024). 1st Workshop on Advances in Asymmetric Cryptanalysis (AAC 2024). 6th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2024). 1st Workshop on Low-Latency Encryption (LLE 2024). 4th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2024).
Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13285)
by Jianying Zhou Sridhar Adepu Cristina Alcaraz Lejla Batina Emiliano Casalicchio Sudipta Chattopadhyay Chenglu Jin Jingqiang Lin Eleonora Losiouk Suryadipta Majumdar Weizhi Meng Stjepan Picek Jun Shao Chunhua Su Cong Wang Yury Zhauniarovich Saman ZonouzThis book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops:– AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security– AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security– AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security– CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security– Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy– SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation– SecMT: 3rd ACNS Workshop on Security in Mobile Technologies– SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications