Søkt på: Bøker av Colin Boyd
totalt 42 treff
Protocols for Authentication and Key Establishment
This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors …
Ritual, Play and Belief, in Evolution and Early Human Societies
The origins of religion and ritual in humans have been the focus of centuries of thought in archaeology, anthropology, theology, evolutionary psychology and more. Play and ritual …
Foundations of Human Sociality
What motives underlie the ways humans interact socially? Are these the same for all societies? Are these part of our nature, or influenced by our environments? Over the last …
Protocols for Authentication and Key Establishment
Foundations of Human Sociality
What motives underlie the ways humans interact socially? Are these the same for all societies? Are these part of our nature, or influenced by our environments?Over the last decade, …
After Independence
At the height of the Scottish Independence debate, After Independence offers an in-depth and varied exploration of the possibilities for Scotland, from both pro and …
Abortion Care as Moral Work
Abortion Care as Moral Work brings together the voices of abortion providers, abortion counselors, clinic owners, neonatologists, bioethicists, and historians to discuss how and …
Information Security and Privacy
This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.The …
Tracing the Consequences of Child Poverty
Using life course analysis from the Young Lives study of 12,000 children growing up in Ethiopia, India, Peru and Vietnam over the past 15 years, this book draws on evidence on two …
Information Security and Privacy
The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started in 1996. Over the years ACISP has grown froma relativelysmall …
Protocols for Authentication and Key Establishment
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties …
Protocols for Authentication and Key Establishment
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties …