Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy = second Intern...
~
International Conference on Security and Privacy (2021 :)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy = second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy/ edited by Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath.
Reminder of title:
second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
remainder title:
ICSP 2021
other author:
Stanica, Pantelimon.
corporate name:
International Conference on Security and Privacy
Published:
Cham :Springer International Publishing : : 2021.,
Description:
xii, 147 p. :ill., digital ;24 cm.
[NT 15003449]:
Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-030-90553-8
ISBN:
9783030905538
Security and privacy = second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
Security and privacy
second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /[electronic resource] :ICSP 2021edited by Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath. - Cham :Springer International Publishing :2021. - xii, 147 p. :ill., digital ;24 cm. - Communications in computer and information science,14971865-0937 ;. - Communications in computer and information science ;1497..
Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
ISBN: 9783030905538
Standard No.: 10.1007/978-3-030-90553-8doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / I57 2021
Dewey Class. No.: 005.8
Security and privacy = second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
LDR
:02113nmm a2200385 a 4500
001
2301507
003
DE-He213
005
20220117040851.0
006
m d
007
cr nn 008maaau
008
230409s2021 sz s 0 eng d
020
$a
9783030905538
$q
(electronic bk.)
020
$a
9783030905521
$q
(paper)
024
7
$a
10.1007/978-3-030-90553-8
$2
doi
035
$a
978-3-030-90553-8
035
$a
2301507
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I57 2021
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2021
111
2
$a
International Conference on Security and Privacy
$n
(2nd :
$d
2021 :
$c
Jamshedpur, India)
$3
3600967
245
1 0
$a
Security and privacy
$h
[electronic resource] :
$b
second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
$c
edited by Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath.
246
3
$a
ICSP 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 147 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1497
505
0
$a
Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
520
$a
This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Security Services.
$3
3382346
700
1
$a
Stanica, Pantelimon.
$3
3492392
700
1
$a
Mesnager, Sihem.
$3
2134557
700
1
$a
Debnath, Sumit Kumar.
$3
3492394
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1497.
$3
3600968
856
4 0
$u
https://doi.org/10.1007/978-3-030-90553-8
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9443056
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I57 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login