Information security and cryptology -- ICISC 2020 [electronic resource] : 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings / Deukjo Hong (ed.).
2021
QA76.9.A25
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Information security and cryptology -- ICISC 2020 [electronic resource] : 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings / Deukjo Hong (ed.).
Meeting Name
ISBN
9783030688905 (electronic bk.)
3030688909 (electronic bk.)
9783030688899
3030688895
3030688909 (electronic bk.)
9783030688899
3030688895
Published
Cham : Springer, 2021.
Language
English
Description
1 online resource (289 pages).
Item Number
10.1007/978-3-030-68890-5 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the conference was held online. The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.
Note
"The 23rd International Conference on Information Security and Cryptology (ICISC2020) was held in virtual format during December 2-4, 2020"--Preface
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 16, 2021).
Added Author
Series
Lecture notes in computer science ; 12593.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Linked Resources
Record Appears in
Table of Contents
Security Models
Cryptography in Quantum Computer Age
Constructions and Designs
Efficient Implementations
Security Analysis
Artificial Intelligence and Cryptocurrency
Fault and Side-Channel Attack.
Cryptography in Quantum Computer Age
Constructions and Designs
Efficient Implementations
Security Analysis
Artificial Intelligence and Cryptocurrency
Fault and Side-Channel Attack.