소장자료
LDR | 03517nam a22006135i 4500 | ||
001 | 0100561024▲ | ||
003 | DE-He213▲ | ||
005 | 20230320152556▲ | ||
007 | cr nn 008mamaa▲ | ||
008 | 200403s2020 gw | s |||| 0|eng d▲ | ||
020 | ▼a9783030429218▼9978-3-030-42921-8▲ | ||
024 | 7 | ▼a10.1007/978-3-030-42921-8▼2doi▲ | |
050 | 4 | ▼aQA76.9.A25▲ | |
082 | 0 | 4 | ▼a005.8▼223▲ |
245 | 1 | 0 | ▼aInformation Security and Cryptology▼h[electronic resource] :▼b15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers /▼cedited by Zhe Liu, Moti Yung.▲ |
250 | ▼a1st ed. 2020.▲ | ||
264 | 1 | ▼aCham :▼bSpringer International Publishing :▼bImprint: Springer,▼c2020.▲ | |
300 | ▼aXIV, 562 p. 264 illus., 71 illus. in color.▼bonline resource.▲ | ||
336 | ▼atext▼btxt▼2rdacontent▲ | ||
337 | ▼acomputer▼bc▼2rdamedia▲ | ||
338 | ▼aonline resource▼bcr▼2rdacarrier▲ | ||
347 | ▼atext file▼bPDF▼2rda▲ | ||
490 | 1 | ▼aSecurity and Cryptology ;▼v12020▲ | |
505 | 0 | ▼aInvited Papers -- Post-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel Attacks -- Identity-Based Cryptography -- Signatures -- Cryptanalysis -- Authentication -- Mathematical Foundations.▲ | |
520 | ▼aThis book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.▲ | ||
650 | 0 | ▼aComputer security.▲ | |
650 | 0 | ▼aData encryption (Computer science).▲ | |
650 | 0 | ▼aApplication software.▲ | |
650 | 0 | ▼aComputer communication systems.▲ | |
650 | 0 | ▼aComputer networks▼xSecurity measures.▲ | |
650 | 0 | ▼aArchitecture, Computer.▲ | |
650 | 1 | 4 | ▼aSystems and Data Security.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I28060▲ |
650 | 2 | 4 | ▼aCryptology.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I28020▲ |
650 | 2 | 4 | ▼aInformation Systems Applications (incl. Internet).▼0https://scigraph.springernature.com/ontologies/product-market-codes/I18040▲ |
650 | 2 | 4 | ▼aComputer Communication Networks.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I13022▲ |
650 | 2 | 4 | ▼aMobile and Network Security.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I28050▲ |
650 | 2 | 4 | ▼aComputer System Implementation.▼0https://scigraph.springernature.com/ontologies/product-market-codes/I13057▲ |
700 | 1 | ▼aLiu, Zhe.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
700 | 1 | ▼aYung, Moti.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt▲ | |
710 | 2 | ▼aSpringerLink (Online service)▲ | |
773 | 0 | ▼tSpringer Nature eBook▲ | |
776 | 0 | 8 | ▼iPrinted edition:▼z9783030429201▲ |
776 | 0 | 8 | ▼iPrinted edition:▼z9783030429225▲ |
830 | 0 | ▼aSecurity and Cryptology ;▼v12020▲ | |
856 | 4 | 0 | ▼uhttps://doi.org/10.1007/978-3-030-42921-8▲ |

Information Security and Cryptology : 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers
자료유형
국외eBook
서명/책임사항
Information Security and Cryptology [electronic resource] : 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers / edited by Zhe Liu, Moti Yung.
판사항
1st ed. 2020.
형태사항
XIV, 562 p. 264 illus., 71 illus. in color. online resource.
총서사항
내용주기
Invited Papers -- Post-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel Attacks -- Identity-Based Cryptography -- Signatures -- Cryptanalysis -- Authentication -- Mathematical Foundations.
요약주기
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
주제
Computer security.
Data encryption (Computer science).
Application software.
Computer communication systems.
Computer networks, Security measures.
Architecture, Computer.
Systems and Data Security.
Cryptology.
Information Systems Applications (incl. Internet).
Computer Communication Networks.
Mobile and Network Security.
Computer System Implementation.
Data encryption (Computer science).
Application software.
Computer communication systems.
Computer networks, Security measures.
Architecture, Computer.
Systems and Data Security.
Cryptology.
Information Systems Applications (incl. Internet).
Computer Communication Networks.
Mobile and Network Security.
Computer System Implementation.
ISBN
9783030429218
관련 인기대출 도서