Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (eds.).
2021
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Security and privacy : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (eds.).
ISBN
9783030905538 (electronic bk.)
3030905535 (electronic bk.)
3030905527 (print)
9783030905521 (print)
3030905535 (electronic bk.)
3030905527 (print)
9783030905521 (print)
Publication Details
Cham, Switzerland : Springer, 2021.
Language
English
Description
1 online resource (154 pages)
Item Number
10.1007/978-3-030-90553-8 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Note
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed November 22, 2021).
Series
Communications in computer and information science ; 1497.
Available in Other Form
Security and Privacy
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Cryptanalysis and other attacks
Symmetric cryptography and hash functions and Mathematical foundations of cryptography
Embedded systems security and Security in hardware
Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Symmetric cryptography and hash functions and Mathematical foundations of cryptography
Embedded systems security and Security in hardware
Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.