Security and privacy [electronic resource] : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (eds.).
2021
QA76.9.A25
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Security and privacy [electronic resource] : second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings / Pantelimon Stănică, Sihem Mesnager, Sumit Kumar Debnath (eds.).
ISBN
9783030905538 (electronic bk.)
3030905535 (electronic bk.)
3030905527 (print)
9783030905521 (print)
3030905535 (electronic bk.)
3030905527 (print)
9783030905521 (print)
Published
Cham, Switzerland : Springer, 2021.
Language
English
Description
1 online resource (154 pages).
Item Number
10.1007/978-3-030-90553-8 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Note
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed November 22, 2021).
Series
Communications in computer and information science ; 1497.
Available in Other Form
Linked Resources
Record Appears in
Table of Contents
Cryptanalysis and other attacks
Symmetric cryptography and hash functions and Mathematical foundations of cryptography
Embedded systems security and Security in hardware
Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Symmetric cryptography and hash functions and Mathematical foundations of cryptography
Embedded systems security and Security in hardware
Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.