An exploration of coding that investigates the interplay between computational abstractions and the fundamentally interpretive nature of human experience. The importance of coding in K–12 classrooms has been taken up by both scholars and educators. Voicing Code in STEM offers a new way to think about coding in the classroom—one that goes beyond device-level engagement to consider the int…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
"Examines the relationship between nature and economy by telling two closely connected stories: that of the ocean and its transformation into a regulated, assetized space; and that of the Atlantic cod"--OCLC-licensed vendor bibliographic record.
"Critical Code Studies (CCS) names a set of methodologies for the exploration of computer source code using the hermeneutics of the humanities. Like 10 PRINT CHR$ (205.5 + RND (1)); : GOTO 10, Mark Marino's Critical Code Studies treats code not as merely functional but as a text, one that can be read, and misinterpreted, by non-programmers. As the author notes, code's "meaning is not determined…
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…
An exploration of the economization of the ocean through the small modifications that enable great transformations of nature. The ocean is the site of an ongoing transformation that is aimed at creating new economic opportunities and prosperity. In Nature-Made Economy, Kristin Asdal and Tone Huse explore how the ocean has been harnessed to become a space of capital investment and innovation,…
The origin story and emergence of molecular biology is muddled. The early triumphs in bacterial genetics and the complexity of animal and plant genomes complicate an intricate history. This book documents the many advances, as well as the prejudices and founder fallacies. It highlights the premature relegation of RNA to simply an intermediate between gene and protein, the underestimation of the…
IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its spe…
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authent…
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …