Is a secret halved…? High-flying oncologist professor Jack Kincaid isn't convinced by the treatment offered at Dolphin Bay Healing Resort. But if there's the slightest possibility that dolphins can help his little nephew Harry, he needs to give it a chance! Especially when he recognizes beautiful therapist Dr. Kate Martin—the woman he once knew as Cathy! Jack can't help but be intrigued, and he's just as attracted to her as he always was. And when Kate reveals to him the devastating secret that she will do anything to escape, not only does she share her burden, but she starts to open up Jack's locked-away heart, too….
Newbery Medal–winning author Patricia MacLachlan paints a moving portrait of what it means to be a family, the power of love, and the importance of bringing the truth out into the light, in this beautiful and profound story about adoption. Nora and Ben’s younger sister Birdy loves to keep secrets. She surprises her family more than once: She hides a kitten in her room. She writes a beautiful poem. One day Birdy watches her mother spit into a tube, ready to send it off to find out more about herself and where her family came from. Birdy spits into a tube, too, when no one sees her. But when the test results come back, they are a surprise. Birdy is seemingly not related to Nora and Ben’s parents. But if she is adopted, how could that have happened without the children knowing? Nora and Ben must learn when to keep a secret, and who to go to for help—and eventually, how to solve this secret for the entire family.
Hidden desires are set free in SECRET Shared - the intoxicating, intensely sexy second novel in the internationally bestselling S.E.C.R.E.T series. Cassie Robichaud has come a long way from the invisible, insecure woman she was a year ago. As she takes her place as a guide for S·E·C·R·E·T - an underground society dedicated to helping women realize their wildest, most intimate sexual fantasies - Cassie tries to put the bittersweet memories of the man who was almost hers behind her. But while helping a new member, Dauphine, to live out the passionate adventures she's kept buried for so long, Cassie's connection with one of the male recruits may unravel the one thing she's afraid to leave exposed: her heart. Can a passion formed in fantasy ever become love in Cassie's reality? An irresistible, erotically charged and unforgettable romance series, perfect for fans of E. L. James' Fifty Shades of Grey trilogy and Sylvia Day's Bared to You.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
This volume fulfills the author's career-long reflections on radical otherness in literature. J. Hillis Miller investigates otherness through ten nineteenth- and twentieth-century authors: Friedrich Schlegel, Charles Dickens, George Eliot, Anthony Trollope, Joseph Conrad, W. B. Yeats, E. M. Forster, Marcel Proust, Paul de Man, and Jacques Derrida. From the exquisite close readings for which he is celebrated, Miller reaps a capacious understanding of otherness--one reachable not through theory but through literature itself. Otherness has wide valence in contemporary literary and cultural studies and is often understood as a misconception by hegemonic groups of subaltern ones. In a pleasing counter to this, Others conceives of otherness as something that inhabits sameness. Instances of the ''wholly other'' within the familiar include your sense of self or your beloved, your sense of your culture as such, or your experience of literary, theoretical, and philosophical works that belong to your own culture--works that are themselves haunted by otherness. Though Others begins and ends with chapters on theorists, the testimony they offer about otherness is not taken as more compelling than that of such literary works as Dicken's Our Mutual Friend, Conrad's ''The Secret Sharer,'' Yeats's ''Cold Heaven,'' or Proust's Remembrance of Things Past. Otherness, as this book finds it in the writers read, is not an abstract concept. It is an elusive feature of specific verbal constructs, different in each case. It can be glimpsed only through close readings that respect this diversity, as the plural in the title--Others--indicates. We perceive otherness in the way that the unseen--and the characters' emotional responses to it--ripples the conservative ideological surface of Howard's End. We sense it as chaos in Schlegel's radical concept of irony. And we gaze at it in the multiple personifications of Heart of Darkness. Each testifies in its own way to the richness and tangible weight of an otherness close at hand.
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.
This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.