Normal view MARC view ISBD view

Information Security [electronic resource] : 23rd International Conference, ISC 2020, Bali, Indonesia, December 16-18, 2020, Proceedings / edited by Willy Susilo, Robert H. Deng, Fuchun Guo, Yannan Li, Rolly Intan.

Contributor(s): Susilo, Willy [editor.] | Deng, Robert H [editor.] | Guo, Fuchun [editor.] | Li, Yannan [editor.] | Intan, Rolly [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 12472Publisher: Cham : Springer International Publishing : Imprint: Springer, 2020Edition: 1st ed. 2020.Description: XIII, 426 p. 117 illus., 83 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030629748.Subject(s): Data protection | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Public-key Cryptography -- Symmetric-key Cryptography and Lattice -- Attacks and Cryptanalysis -- Malware Analysis -- Network and System Security -- Blockchain -- Security Applications. .
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well. .
    average rating: 0.0 (0 votes)
No physical items for this record

Public-key Cryptography -- Symmetric-key Cryptography and Lattice -- Attacks and Cryptanalysis -- Malware Analysis -- Network and System Security -- Blockchain -- Security Applications. .

This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well. .

There are no comments for this item.

Log in to your account to post a comment.