Information Security and Cryptology [electronic resource] : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung.
Contributor(s): Chen, Xiaofeng [editor.] | Lin, Dongdai [editor.] | Yung, Moti [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 10726Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: XXI, 530 p. 84 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319751603.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Coding theory | Information theory | Computers and civilization | Computers -- Law and legislation | Information technology -- Law and legislation | Data mining | Data and Information Security | Cryptology | Coding and Information Theory | Computers and Society | Legal Aspects of Computing | Data Mining and Knowledge DiscoveryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.No physical items for this record
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications.
There are no comments for this item.