Amazon cover image
Image from Amazon.com

Frontiers in Cyber Security [electronic resource] : Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings /

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 1105Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2019Edition: 1st ed. 2019Description: XVII, 365 p. 116 illus., 45 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789811508189
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Symmetric Key Cryptography -- Public Key Cryptography -- Post-quantum Cryptography -- Signature -- Attack and Behavior Detection -- Authenticated Key Agreement -- Blockchain -- System and Network Security.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Symmetric Key Cryptography -- Public Key Cryptography -- Post-quantum Cryptography -- Signature -- Attack and Behavior Detection -- Authenticated Key Agreement -- Blockchain -- System and Network Security.

This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in