000 | 03499nam a22007215i 4500 | ||
---|---|---|---|
001 | 978-3-030-88052-1 | ||
003 | DE-He213 | ||
005 | 20240730174307.0 | ||
007 | cr nn 008mamaa | ||
008 | 210915s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030880521 _9978-3-030-88052-1 |
||
024 | 7 |
_a10.1007/978-3-030-88052-1 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
245 | 1 | 0 |
_aInformation and Communications Security _h[electronic resource] : _b23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II / _cedited by Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXXV, 415 p. 105 illus., 81 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12919 |
|
505 | 0 | _aMachine Learning Security -- Multimedia Security -- Security Analysis -- Post-Quantum Cryptography -- Applied Cryptography. | |
520 | _aThis two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part II are organized in the following thematic blocks: machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography. | ||
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aApplication software. _9111880 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 1 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9111881 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9111882 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
700 | 1 |
_aGao, Debin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9111883 |
|
700 | 1 |
_aLi, Qi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9111884 |
|
700 | 1 |
_aGuan, Xiaohong. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9111885 |
|
700 | 1 |
_aLiao, Xiaofeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9111886 |
|
710 | 2 |
_aSpringerLink (Online service) _9111887 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030880514 |
776 | 0 | 8 |
_iPrinted edition: _z9783030880538 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12919 _9111888 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-88052-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89354 _d89354 |