Information and communications security : 23rd international conference, ICICS 2021, Chongqing, China, November 19-21, 2021 : proceedings. Part II / Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao (eds.).
2021
QA76.9.A25 I35 2021
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Information and communications security : 23rd international conference, ICICS 2021, Chongqing, China, November 19-21, 2021 : proceedings. Part II / Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao (eds.).
Meeting Name
ISBN
9783030880521 (electronic bk.)
3030880524 (electronic bk.)
9783030868895
3030868893
3030880524 (electronic bk.)
9783030868895
3030868893
Published
Cham : Springer, [2021]
Copyright
©2021
Language
English
Description
1 online resource : illustrations (chiefly color)
Item Number
10.1007/978-3-030-88052-1 doi
Call Number
QA76.9.A25 I35 2021
Dewey Decimal Classification
005.8
Summary
This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part II are organized in the following thematic blocks: machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed September 24, 2021).
Series
Lecture notes in computer science ; 12919.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783030868895
Linked Resources
Record Appears in
Table of Contents
Machine Learning Security
Multimedia Security
Security Analysis
Post-Quantum Cryptography
Applied Cryptography.
Multimedia Security
Security Analysis
Post-Quantum Cryptography
Applied Cryptography.