001441362 000__ 02970cam\a2200637\i\4500 001441362 001__ 1441362 001441362 003__ OCoLC 001441362 005__ 20230309004734.0 001441362 006__ m\\\\\o\\d\\\\\\\\ 001441362 007__ cr\un\nnnunnun 001441362 008__ 211218s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001441362 019__ $$a1288962146$$a1289249389$$a1289341141$$a1289367242$$a1292517559$$a1294365845 001441362 020__ $$a9783030926410$$q(electronic bk.) 001441362 020__ $$a3030926419$$q(electronic bk.) 001441362 020__ $$z9783030926403 001441362 020__ $$z3030926400 001441362 0247_ $$a10.1007/978-3-030-92641-0$$2doi 001441362 035__ $$aSP(OCoLC)1289365276 001441362 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCF$$dDKU$$dOCLCO$$dDCT$$dOCLCQ$$dOCLCO$$dOCLCQ 001441362 049__ $$aISEA 001441362 050_4 $$aQA76.9.A25$$bI53 2021 001441362 08204 $$a005.8/24$$223 001441362 1112_ $$aIMA International Conference$$n(18th :$$d2021 :$$cOnline) 001441362 24510 $$aCryptography and coding :$$b18th IMA international conference, IMACC 2021, virtual event, December 14-15, 2021 : proceedings /$$cMaura B. Paterson (eds.). 001441362 24630 $$aIMACC 2021 001441362 264_1 $$aCham :$$bSpringer,$$c[2021] 001441362 264_4 $$c©2021 001441362 300__ $$a1 online resource :$$billustrations (some color) 001441362 336__ $$atext$$btxt$$2rdacontent 001441362 337__ $$acomputer$$bc$$2rdamedia 001441362 338__ $$aonline resource$$bcr$$2rdacarrier 001441362 347__ $$atext file 001441362 347__ $$bPDF 001441362 4901_ $$aLecture notes in computer science ;$$v13129 001441362 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001441362 500__ $$aInternational conference proceedings. 001441362 500__ $$aIncludes author index. 001441362 5050_ $$aSerious Games Applications -- Serious Game to Improve Literacy -- Technology used for Serious Games -- Serious Game Usage; Serious Games Design. 001441362 506__ $$aAccess limited to authorized users. 001441362 520__ $$aThis book constitutes the refereed proceedings of the 18th IMA International Conference on Cryptography and Coding, IMACC 2021, held in December 2021. Due to COVID 19 pandemic the conference was held virtually. The 14 papers presented were carefully reviewed and selected from 30 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory. 001441362 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 22, 2021). 001441362 650_0 $$aData encryption (Computer science)$$vCongresses. 001441362 650_6 $$aChiffrement (Informatique)$$vCongrès. 001441362 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001441362 655_7 $$aConference papers and proceedings.$$2lcgft 001441362 655_7 $$aActes de congrès.$$2rvmgf 001441362 655_0 $$aElectronic books. 001441362 7001_ $$aPaterson, Maura B.,$$eeditor. 001441362 830_0 $$aLecture notes in computer science ;$$v13129. 001441362 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001441362 852__ $$bebk 001441362 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-92641-0$$zOnline Access$$91397441.1 001441362 909CO $$ooai:library.usi.edu:1441362$$pGLOBAL_SET 001441362 980__ $$aBIB 001441362 980__ $$aEBOOK 001441362 982__ $$aEbook 001441362 983__ $$aOnline 001441362 994__ $$a92$$bISE