Shel Silverstein
Michael Conway
Brinton Turkle
When obadiah receives a new spy glass, he dreams of becoming a fearless pirate, but with the help of a prank played by his brothers and sisters and a special present from his father, obadiah learns the true meaning of bravery.
Robert Coughlan
Bruce Brander
Leon H. Canfield
George Alfred Schrader
Hopper Striker Mott
Berlitz Publishing Company.
Nurit Kliot
Chenevix Trench, Charles
Petŭr Dimitrov-Rudar
Anna L. Eckersley-Johnson
Paul Sturtevant Howe
Mark R. Lipschutz
Stanley W. Wells
John Henrik Clarke
Kurt Weitzmann
X. J. Kennedy
A collection of nonsense verses about unheard-of birds, couldn't-be beasts, magical menaces, a far-out family, and other topics.
George Laycock
Thomas Burnett Swann
Diagram Group.
Dean Albert Anderson
New Jersey History Symposium (2nd 1970 Trenton, N.J.)
Dennis B. Fradin
Presents a brief history and description of the beaver state.
Bert Randolph Sugar
Gregory White Smith
Dee Alexander Brown
Douglas E. Winter
A critical look at the work of stephen king, writer of horror stories.
Warren Christopher
Katharine Ross
R. Conrad Stein
Describes the history, organization, and functions of the united nations.
Francis R. Line
L. B. Taylor
Kathryn Allen Goldner
Calvin Chatlos
Johnson, Jean
Judy Monroe
A biography of the west german tennis player who won her first grand slam tournament at age seventeen and received the number one ranking in 1987.
J. Seward Johnson
Wright, David
H. I. Peeples
Traces the origins of bubble gum, describing its discovery, processing, composition, and international appeal.
Vincent Cronin
This portrait of paris between 1900 and 1914, when it was the artistic centre of europe, is evoked by a series of character sketches of important figures, such as proust, gide, claudel, debussy, sarah bernhardt, picasso, diaghilev and the curies.
Linda Lael Miller
Langone, John
Throughout the world the 20th century has been a time of expansion, both in terms of population growth and technological advances.
Joan Davenport Carris
Punch and his friends spend a summer in north carolina looking at dolphins, hunting for blackbeard's buried treasure, and watching out for the famed pirate's ghost.
Parker, Michael
Set in a coastal north carolina town in 1952, this lyrical first novel tells the haunting story of two star-crossed lovers caught in the throes of class tension and family upheaval.
Reader's Digest Association
This is one of a 12 volume series of books covering various metaphysical and paranormal ideas and theories mostly presented in a fortean manner.
Michael D'Antonio
William S. McFeely
Historian william mcfeely, pulitzer prize winner in 1982 for grant: a biography explores america's history of slavery and reconstruction by recreating the rich but troubled past of the people of sapelo, a low-lying barrier island off the coast of georgia.
Raymond Chandler
In raymond chandler’s hands, the pulp crime story became a haunting mystery of power and corruption, set against a modern cityscape both lyrical and violent.
James Earl Hardy
Describes the development of the music group that was the first to break elvis presley's record for length as number one on the pop chart.
Yana Parker
One of the best-selling resume books of all time and a trusted resource for job-seekers for nearly three decades, this edition of the damn good resume guide has been completely revised and updated for today’s marketplace.
Ron Zoglin
"this is a fun and painless way to give yourself a firm grounding in the wide wonderful world of antiques and collectibles.
Suyel Namasudra
This book discusses the current technologies of cryptography using dna computing.
Alexander V. Sergienko
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing.
Alfred J. Menezes
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications.
Alexander V. Sergienko
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing.
James Kraft
Building on the success of the first edition, an introduction to number theory with cryptography, second edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics .
Alexander V. Sergienko
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing.
Jerzy Kaczorowski
Sahadeo Padhye
Hu Xiong
As an intermediate model between conventional pkc and id-pkc, cl-pkc can avoid the heavy overhead of certificate management in traditional pkc as well as the key escrow problem in id-pkc altogether.
Brett Shavers
Brett Shavers
Katherine Ellison
During and after the english civil wars, between 1640 and 1690, an unprecedented number of manuals teaching cryptography were published, almost all for the general public.
Katherine Ellison
During and after the english civil wars, between 1640 and 1690, an unprecedented number of manuals teaching cryptography were published, almost all for the general public.
Hu Xiong
As an intermediate model between conventional pkc and id-pkc, cl-pkc can avoid the heavy overhead of certificate management in traditional pkc as well as the key escrow problem in id-pkc altogether.
Chen-Mou Cheng
Jenny Nater
The second world war upended many lives, disrupting patterns and routines and bringing an array of terrifying new dangers with it.
Nigel Smart
In this introductory textbook the author explains the key topics in cryptography.
Yevgeniy Dodis
Smith, Michael
Saiful Azad
Smith, Michael
Marc Joye
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against aes, attack-resistent devices, fault attacks on stream ciphers and fault injection experim.
David Kahn
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten america and society depends so heavily on communications.
Lynn Margaret Batten
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including elgamal, rsa, elliptic curve, and digital signature schemes.
Czesław Kościelny
Miroslaw Kutylowski
Ralph Bennett
Military intelligence, grossly neglected during the interwar period, had by mid-1942 proved itself indispensable through information gathered from intercepted radio messages in the supposedly unbreakable german enigma cipher.
Ralph Bennett
Military intelligence, grossly neglected during the interwar period, had by mid-1942 proved itself indispensable through information gathered from intercepted radio messages in the supposedly unbreakable german enigma cipher.
Rolf Oppliger
Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an artech house classic puts all aspects of this important topic into perspective.
Jillian Gregory
Coded information may look confusing, but most codes provide hints that can help you break them.
Kamol Lek
Phil Shanahan
Alexander Stanoyevitch
From the exciting history of its development in ancient times to the present day, introduction to cryptography with mathematical foundations and computer implementations provides a focused tour of the central concepts of cryptography.
M. Joye
Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since.
Toshio Nakami
Nick Moldovyan
The most progressive and complete guide to ddo-based ciphers developers have long recognized that ciphers based on permutation networks (pns) and controlled substitution-permutation networks (cspns) allow for the implementation of a variety of data driven.
W. B. Vasantha Kandasamy
Canadian Workshop on Information Theory (2007 Edmonton, Alta.)
Lambert, David
International Symposium on Quantum Informatics (3rd 2005 Moscow, Russia)
Quantum informatics 2005 (qi-2005) is the third international symposium ...
Janey Levy
Arnaldo Garcia
The theory of algebraic function fields over finite fields has its origins in number theory.
Moti Yung
The 9th international conference on theory and practice of public-key cr- tography(pkc 2006) took place in new york city.
Michael Welschenbach
Cryptography is an ancient art, well over two thousand years old.
Theory of Cryptography Conference (2nd 2005 Cambridge, Mass.)
Tcc 2005, the 2nd annual theory of cryptography conference, was held in cambridge, massachusetts, onfebruary10 12,2005.
Alfred John Menezes
The rsa conferenceis attended by over10,000securityprofessionalseach year.
Helena Handschuh
This book constitutes the thoroughly refereed post-proceedings of the 11th international workshop on selected areas in cryptography, sac 2004, held in waterloo, canada in august 2004.
Kenneth G. Paterson
The ninth in the series of ima conferences on cryptography and coding was held (as ever) at the royal agricultural college, cirencester, from 16 18 dec- ber 2003.
Florian Baur
Donald M. Davis
This captivating book explains some of mathematics' most fascinating ideas to nonspecialists.
Jong In Lim
This book constitutes the thoroughly refereed post-proceedings of the 6th international conference on information security and cryptology, icisc 2003, held in seoul, korea, in november 2003.