Normal view MARC view ISBD view

Advances in Information and Computer Security [electronic resource] : 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings / edited by Chen-Mou Cheng, Mitsuaki Akiyama.

Contributor(s): Cheng, Chen-Mou [editor.] | Akiyama, Mitsuaki [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 13504Publisher: Cham : Springer International Publishing : Imprint: Springer, 2022Edition: 1st ed. 2022.Description: XII, 241 p. 50 illus., 23 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031152559.Subject(s): Data protection | Application software | Computers | Computer networks  | Data and Information Security | Computer and Information Systems Applications | Computing Milieux | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 17th International Workshop on Security, IWSEC 2022, which took place as a hybrid event in Tokyo, Japan, in August/September 2022. The 12 full papers presented in this book were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows: mathematical cryptography; system security and threat intelligence; symmetric-key cryptography; post-quantum cryptography; advanced cryptography. .
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 17th International Workshop on Security, IWSEC 2022, which took place as a hybrid event in Tokyo, Japan, in August/September 2022. The 12 full papers presented in this book were carefully reviewed and selected from 34 submissions. They were organized in topical sections as follows: mathematical cryptography; system security and threat intelligence; symmetric-key cryptography; post-quantum cryptography; advanced cryptography. .

There are no comments for this item.

Log in to your account to post a comment.