Information Security [electronic resource] : 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings / edited by Phong Q. Nguyen, Jianying Zhou.
Material type: TextSeries: Security and Cryptology ; 10599 | Lecture Notes in Computer Science ; 10599Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: XIII, 474 p. 115 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319696591Subject(s): Computer security | Data encryption (Computer science) | Computer organization | Computers | Artificial intelligence | Coding theory | Information theory | Systems and Data Security | Cryptology | Computer Systems Organization and Communication Networks | Computing Milieux | Artificial Intelligence | Coding and Information TheoryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.Current library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK14790 |
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.
There are no comments on this title.