000 | 03175nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-030-41025-4 | ||
003 | DE-He213 | ||
005 | 20240730171820.0 | ||
007 | cr nn 008mamaa | ||
008 | 200227s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030410254 _9978-3-030-41025-4 |
||
024 | 7 |
_a10.1007/978-3-030-41025-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInnovative Security Solutions for Information Technology and Communications _h[electronic resource] : _b12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers / _cedited by Emil Simion, Rémi Géraud-Stewart. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXXII, 257 p. 160 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12001 |
|
505 | 0 | _aCryptography -- Information security -- Key Exchange algorithms -- Post-quantum cryptography -- Privacy -- Security -- IoT architectures -- Elliptic curves -- Mobil critical communications. . | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information Technology and Communications, SecITC 2019, held in Bucharest, Romania, in November 2019. The 14 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 34 submissions. The papers present a wide range from cryptographic algorithms, to digital forensic and cyber security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer systems. _9100499 |
|
650 | 0 |
_aApplication software. _9100501 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aComputer Communication Networks. _9100502 |
650 | 2 | 4 |
_aComputer System Implementation. _938514 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9100503 |
700 | 1 |
_aSimion, Emil. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100505 |
|
700 | 1 |
_aGéraud-Stewart, Rémi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100507 |
|
710 | 2 |
_aSpringerLink (Online service) _9100510 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030410247 |
776 | 0 | 8 |
_iPrinted edition: _z9783030410261 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12001 _9100512 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-41025-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c87830 _d87830 |