語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy = second Intern...
~
International Conference on Security and Privacy (2021 :)
FindBook
Google Book
Amazon
博客來
Security and privacy = second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security and privacy/ edited by Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath.
其他題名:
second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
其他題名:
ICSP 2021
其他作者:
Stanica, Pantelimon.
團體作者:
International Conference on Security and Privacy
出版者:
Cham :Springer International Publishing : : 2021.,
面頁冊數:
xii, 147 p. :ill., digital ;24 cm.
內容註:
Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-90553-8
ISBN:
9783030905538
Security and privacy = second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
Security and privacy
second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /[electronic resource] :ICSP 2021edited by Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath. - Cham :Springer International Publishing :2021. - xii, 147 p. :ill., digital ;24 cm. - Communications in computer and information science,14971865-0937 ;. - Communications in computer and information science ;1497..
Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
ISBN: 9783030905538
Standard No.: 10.1007/978-3-030-90553-8doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / I57 2021
Dewey Class. No.: 005.8
Security and privacy = second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
LDR
:02113nmm a2200385 a 4500
001
2301507
003
DE-He213
005
20220117040851.0
006
m d
007
cr nn 008maaau
008
230409s2021 sz s 0 eng d
020
$a
9783030905538
$q
(electronic bk.)
020
$a
9783030905521
$q
(paper)
024
7
$a
10.1007/978-3-030-90553-8
$2
doi
035
$a
978-3-030-90553-8
035
$a
2301507
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
I57 2021
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2021
111
2
$a
International Conference on Security and Privacy
$n
(2nd :
$d
2021 :
$c
Jamshedpur, India)
$3
3600967
245
1 0
$a
Security and privacy
$h
[electronic resource] :
$b
second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021 : proceedings /
$c
edited by Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath.
246
3
$a
ICSP 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
xii, 147 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1497
505
0
$a
Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
520
$a
This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Security Services.
$3
3382346
700
1
$a
Stanica, Pantelimon.
$3
3492392
700
1
$a
Mesnager, Sihem.
$3
2134557
700
1
$a
Debnath, Sumit Kumar.
$3
3492394
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1497.
$3
3600968
856
4 0
$u
https://doi.org/10.1007/978-3-030-90553-8
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9443056
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 I57 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入