001440872 000__ 03520cam\a2200649\a\4500 001440872 001__ 1440872 001440872 003__ OCoLC 001440872 005__ 20230309004707.0 001440872 006__ m\\\\\o\\d\\\\\\\\ 001440872 007__ cr\un\nnnunnun 001440872 008__ 211113s2021\\\\sz\\\\\\o\\\\\101\0\eng\d 001440872 019__ $$a1285163046$$a1285239469$$a1285254528$$a1285275293$$a1292518742$$a1294352031 001440872 020__ $$a9783030905538$$q(electronic bk.) 001440872 020__ $$a3030905535$$q(electronic bk.) 001440872 020__ $$z3030905527$$q(print) 001440872 020__ $$z9783030905521$$q(print) 001440872 0247_ $$a10.1007/978-3-030-90553-8$$2doi 001440872 035__ $$aSP(OCoLC)1285166010 001440872 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dYDX$$dGW5XE$$dEBLCP$$dOCLCF$$dDKU$$dOCLCO$$dDCT$$dOCLCQ$$dCOM$$dOCLCO$$dUKAHL$$dOCLCQ 001440872 049__ $$aISEA 001440872 050_4 $$aQA76.9.A25 001440872 08204 $$a005.8$$223 001440872 1112_ $$aInternational Conference on Security and Privacy$$n(2nd :$$d2021 :$$cJamshedpur, India) 001440872 24510 $$aSecurity and privacy :$$bsecond International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings /$$cPantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (eds.). 001440872 2463_ $$aICSP 2021 001440872 260__ $$aCham, Switzerland :$$bSpringer,$$c2021. 001440872 300__ $$a1 online resource (154 pages) 001440872 336__ $$atext$$btxt$$2rdacontent 001440872 337__ $$acomputer$$bc$$2rdamedia 001440872 338__ $$aonline resource$$bcr$$2rdacarrier 001440872 347__ $$atext file 001440872 347__ $$bPDF 001440872 4901_ $$aCommunications in computer and information science ;$$v1497 001440872 500__ $$aIncludes author index. 001440872 5050_ $$aCryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques. 001440872 506__ $$aAccess limited to authorized users. 001440872 520__ $$aThis book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques. 001440872 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 22, 2021). 001440872 650_0 $$aComputer security$$vCongresses. 001440872 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001440872 650_6 $$aSécurité informatique$$vCongrès. 001440872 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001440872 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001440872 655_7 $$aConference papers and proceedings.$$2lcgft 001440872 655_7 $$aActes de congrès.$$2rvmgf 001440872 655_0 $$aElectronic books. 001440872 7001_ $$aStănică, Pantelimon. 001440872 7001_ $$aMesnager, Sihem. 001440872 7001_ $$aDebnath, Sumit Kumar. 001440872 77608 $$iPrint version:$$aStănică, Pantelimon$$tSecurity and Privacy$$dCham : Springer International Publishing AG,c2021$$z9783030905521 001440872 830_0 $$aCommunications in computer and information science ;$$v1497. 001440872 852__ $$bebk 001440872 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-90553-8$$zOnline Access$$91397441.1 001440872 909CO $$ooai:library.usi.edu:1440872$$pGLOBAL_SET 001440872 980__ $$aBIB 001440872 980__ $$aEBOOK 001440872 982__ $$aEbook 001440872 983__ $$aOnline 001440872 994__ $$a92$$bISE