000 | 03093nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-030-80851-8 | ||
003 | DE-He213 | ||
005 | 20240423125126.0 | ||
007 | cr nn 008mamaa | ||
008 | 210704s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030808518 _9978-3-030-80851-8 |
||
024 | 7 |
_a10.1007/978-3-030-80851-8 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aApplied Cryptography in Computer and Communications _h[electronic resource] : _bFirst EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings / _cedited by Bo Chen, Xinyi Huang. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXI, 211 p. 53 illus., 28 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v386 |
|
520 | _aThis book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices. | ||
650 | 0 | _aApplication software. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer networks . | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aCryptology. |
700 | 1 |
_aChen, Bo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHuang, Xinyi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030808501 |
776 | 0 | 8 |
_iPrinted edition: _z9783030808525 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-822X ; _v386 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-80851-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNS | ||
942 | _cSPRINGER | ||
999 |
_c174521 _d174521 |