000 | 03277nam a22007095i 4500 | ||
---|---|---|---|
001 | 978-3-030-61078-4 | ||
003 | DE-He213 | ||
005 | 20240423125320.0 | ||
007 | cr nn 008mamaa | ||
008 | 201127s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030610784 _9978-3-030-61078-4 |
||
024 | 7 |
_a10.1007/978-3-030-61078-4 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
245 | 1 | 0 |
_aInformation and Communications Security _h[electronic resource] : _b22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings / _cedited by Weizhi Meng, Dieter Gollmann, Christian D. Jensen, Jianying Zhou. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXVI, 608 p. 51 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12282 |
|
505 | 0 | _aSecurity I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . | |
520 | _aThis book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic. | ||
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aData protection. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 1 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
700 | 1 |
_aMeng, Weizhi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGollmann, Dieter. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJensen, Christian D. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aZhou, Jianying. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030610777 |
776 | 0 | 8 |
_iPrinted edition: _z9783030610791 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12282 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-61078-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c176603 _d176603 |