Amazon cover image
Image from Amazon.com

Information and Communications Security [electronic resource] : 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II /

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 12919Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021Description: XXV, 415 p. 105 illus., 81 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783030880521
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.73 23
  • 003.54 23
LOC classification:
  • QA76.9.D35
  • Q350-390
Online resources:
Contents:
Machine Learning Security -- Multimedia Security -- Security Analysis -- Post-Quantum Cryptography -- Applied Cryptography.
In: Springer Nature eBookSummary: This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part II are organized in the following thematic blocks: machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Machine Learning Security -- Multimedia Security -- Security Analysis -- Post-Quantum Cryptography -- Applied Cryptography.

This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and Communications Security, ICICS 2021, held in Chongqing, China, in September 2021. The 49 revised full papers presented in the book were carefully selected from 182 submissions. The papers in Part II are organized in the following thematic blocks: machine learning security; multimedia security; security analysis; post-quantum cryptography; applied cryptography.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in