000 | 03160nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-030-12146-4 | ||
003 | DE-He213 | ||
005 | 20240730165717.0 | ||
007 | cr nn 008mamaa | ||
008 | 190122s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030121464 _9978-3-030-12146-4 |
||
024 | 7 |
_a10.1007/978-3-030-12146-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security and Cryptology - ICISC 2018 _h[electronic resource] : _b21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers / _cedited by Kwangsu Lee. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXV, 371 p. 342 illus., 25 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11396 |
|
505 | 0 | _aInvited Talk -- Public-Key Encryption and Implementation -- Homomorphic Encryption -- Secure Multiparty Computation -- Post-Quantum Cryptography -- Secret Sharing and Searchable Encryption -- Storage Security and Information Retrieval -- Attacks and Software Security. | |
520 | _aThis book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aCoding and Information Theory. _990344 |
650 | 2 | 4 |
_aData Mining and Knowledge Discovery. _990345 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
700 | 1 |
_aLee, Kwangsu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _990346 |
|
710 | 2 |
_aSpringerLink (Online service) _990347 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030121457 |
776 | 0 | 8 |
_iPrinted edition: _z9783030121471 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11396 _990348 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-12146-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86496 _d86496 |