Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Hashing and SortingCovers hashing, sorting, extendible hashing, linear hashing, and external sorting.
Radiative Heat TransferCovers radiative heat transfer, boundary conditions, heat flux, and particle clouds in participating media.