Search results: Found 3

Listing 1 - 3 of 3
Sort by
How We Read

Authors: --- --- --- --- et al.
ISBN: 9781950192311 9781950192328 Year: Pages: 186 DOI: 10.21983/P3.0259.1.00 Language: English
Publisher: punctum books
Subject: Languages and Literatures
Added to DOAB on : 2019-07-27 11:21:02
License:

Loading...
Export citation

Choose an application

Abstract

"What do we do when we read?

Reading can be an act of consumption or an act of creation. Our “work reading” overlaps with our “pleasure reading,” and yet these two modes of reading engage with different parts of the self. It is sometimes passive, sometimes active, and can even be an embodied form.

The contributors to this volume share their own histories of reading in order to reveal the shared pleasure that lies in this most solitary of acts – which is also, paradoxically, the act of most complete plenitude. Many of the contributors engage in academic writing, and several publish in other genres, including poetry and fiction; some contributors maintain an active online presence. All are engaged with reading’s capacity to stimulate and excite as well as to frustrate and confuse. The synergies and tensions of online reading and print reading animate these thirteen contributions, generating a sense of shared community. Together, the authors open their libraries to us. This is how we read."

Open Access and the Library

Authors: ---
ISBN: 9783038977407 Year: Pages: 142 DOI: 10.3390/books978-3-03897-741-4 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Media and communication
Added to DOAB on : 2019-04-05 10:34:31
License:

Loading...
Export citation

Choose an application

Abstract

Libraries are places of learning and knowledge creation. Over the last two decades, digital technology—and the changes that came with it—have accelerated this transformation to a point where evolution starts to become a revolution.The wider Open Science movement, and Open Access in particular, is one of these changes and is already having a profound impact. Under the subscription model, the role of libraries was to buy or license content on behalf of their users and then act as gatekeepers to regulate access on behalf of rights holders. In a world where all research is open, the role of the library is shifting from licensing and disseminating to facilitating and supporting the publishing process itself.This requires a fundamental shift in terms of structures, tasks, and skills. It also changes the idea of a library’s collection. Under the subscription model, contemporary collections largely equal content bought from publishers. Under an open model, the collection is more likely to be the content created by the users of the library (researchers, staff, students, etc.), content that is now curated by the library.Instead of selecting external content, libraries have to understand the content created by their own users and help them to make it publicly available—be it through a local repository, payment of article processing charges, or through advice and guidance. Arguably, this is an overly simplified model that leaves aside special collections and other areas. Even so, it highlights the changes that research libraries are undergoing, changes that are likely to accelerate as a result of initiatives such as Plan S.This Special Issue investigates some of the changes in today’s library services that relate to open access.

Side Channel Attacks

Author:
ISBN: 9783039210008 / 9783039210015 Year: Pages: 258 DOI: 10.3390/books978-3-03921-001-5 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2019-06-26 08:44:06
License:

Loading...
Export citation

Choose an application

Abstract

This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The research papers published in this Special Issue represent recent progress in the field, including research on power analysis attacks, cache-based timing attacks, system-level countermeasures, and so on.

Keywords

cache attack --- cache side-channel attack --- constant-time cryptographic algorithm --- rsa cryptosystem --- scatter-gather implementation --- modular exponentiation --- post-quantum cryptography --- lattice-based cryptography --- Gaussian sampling --- CDT sampling --- side-channel attack --- single trace analysis --- mobile ads --- software development kit (SDK), android package (APK), ad lib --- ad libraries --- ad networks --- graph --- graph similarity --- side-channel authentication --- leakage model --- AES --- FPGA --- unified point addition --- binary Huff curve --- recovery of secret exponent by triangular trace analysis --- horizontal collision correlation analysis --- side channel analysis --- single trace analysis --- post quantum cryptography --- NTRU --- side-channel analysis --- elliptic curve cryptography --- single-trace attack --- key bit-dependent attack --- countermeasure --- side channel analysis --- financial IC card --- first-order analysis --- second-order analysis --- data outsourcing --- integrity --- online authentication --- Merkle (hash) tree --- data loss --- information leakage --- reliability --- side-channel analysis --- power-analysis attack --- embedded system security --- machine-learning classification --- side-channel cache attacks --- cache misses --- AES --- cloud computing --- physically unclonable function --- chaos theory --- chaotic circuit --- FPGA --- CPLD --- challenge-response authentication --- hardware security --- side-channel attacks --- cryptographic keys --- side channel attack --- re-keying --- tweakable block cipher --- provable security --- n/a

Listing 1 - 3 of 3
Sort by
Narrow your search

Publisher

MDPI - Multidisciplinary Digital Publishing Institute (2)

punctum books (1)


License

CC by-nc-nd (2)

CC by-nc-sa (1)


Language

eng (2)

english (1)


Year
From To Submit

2019 (3)