001439761 000__ 03385cam\a2200697\i\4500 001439761 001__ 1439761 001439761 003__ OCoLC 001439761 005__ 20230309004519.0 001439761 006__ m\\\\\o\\d\\\\\\\\ 001439761 007__ cr\un\nnnunnun 001439761 008__ 210919s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001439761 020__ $$a9783030880521$$q(electronic bk.) 001439761 020__ $$a3030880524$$q(electronic bk.) 001439761 020__ $$z9783030868895 001439761 020__ $$z3030868893 001439761 0247_ $$a10.1007/978-3-030-88052-1$$2doi 001439761 035__ $$aSP(OCoLC)1268441479 001439761 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dOCLCO$$dEBLCP$$dOCLCF$$dN$T$$dBRX$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001439761 049__ $$aISEA 001439761 050_4 $$aQA76.9.A25$$bI35 2021 001439761 08204 $$a005.8$$223 001439761 1112_ $$aICICS (Conference)$$n(23rd :$$d2021 :$$cChongqing, China) 001439761 24510 $$aInformation and communications security :$$b23rd international conference, ICICS 2021, Chongqing, China, November 19-21, 2021 : proceedings.$$nPart II /$$cDebin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao (eds.). 001439761 24630 $$aICICS 2021 001439761 264_1 $$aCham :$$bSpringer,$$c[2021] 001439761 264_4 $$c©2021 001439761 300__ $$a1 online resource :$$billustrations (chiefly color) 001439761 336__ $$atext$$btxt$$2rdacontent 001439761 337__ $$acomputer$$bc$$2rdamedia 001439761 338__ $$aonline resource$$bcr$$2rdacarrier 001439761 4901_ $$aLecture notes in computer science ;$$v12919 001439761 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001439761 500__ $$aInternational conference proceedings. 001439761 500__ $$aIncludes author index. 001439761 5050_ $$aMachine Learning Security -- Multimedia Security -- Security Analysis -- Post-Quantum Cryptography -- Applied Cryptography. 001439761 506__ $$aAccess limited to authorized users. 001439761 520__ $$aThis two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part II are organized in the following thematic blocks: machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography. 001439761 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 24, 2021). 001439761 650_0 $$aCryptography$$vCongresses. 001439761 650_0 $$aComputer security$$vCongresses. 001439761 650_0 $$aTelecommunication$$xSecurity measures$$vCongresses. 001439761 650_6 $$aCryptographie$$vCongrès. 001439761 650_6 $$aSécurité informatique$$vCongrès. 001439761 650_6 $$aTélécommunications$$xSécurité$$xMesures$$vCongrès. 001439761 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001439761 655_7 $$aConference papers and proceedings.$$2lcgft 001439761 655_7 $$aActes de congrès.$$2rvmgf 001439761 655_0 $$aElectronic books. 001439761 7001_ $$aGao, Debin,$$eeditor. 001439761 7001_ $$aLi, Qi,$$eeditor. 001439761 7001_ $$aGuan, Xiaohong,$$eeditor. 001439761 7001_ $$aLiao, Xiaofeng,$$eeditor. 001439761 77608 $$iPrint version:$$z3030868893$$z9783030868895$$w(OCoLC)1263865965 001439761 830_0 $$aLecture notes in computer science ;$$v12919. 001439761 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001439761 852__ $$bebk 001439761 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-88052-1$$zOnline Access$$91397441.1 001439761 909CO $$ooai:library.usi.edu:1439761$$pGLOBAL_SET 001439761 980__ $$aBIB 001439761 980__ $$aEBOOK 001439761 982__ $$aEbook 001439761 983__ $$aOnline 001439761 994__ $$a92$$bISE