Amazon cover image
Image from Amazon.com

Security and Privacy [electronic resource] : Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings /

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 1497Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021Description: XII, 147 p. 21 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030905538
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cryptanalysis and other attacks -- Symmetric cryptography and hash functions and Mathematical foundations of cryptography -- Embedded systems security and Security in hardware -- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in