Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings

Author:   Pantelimon Stănică ,  Sihem Mesnager ,  Sumit Kumar Debnath
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   1497
ISBN:  

9783030905521


Pages:   147
Publication Date:   30 October 2021
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: ​Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

Full Product Details

Author:   Pantelimon Stănică ,  Sihem Mesnager ,  Sumit Kumar Debnath
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   1497
Weight:   0.261kg
ISBN:  

9783030905521


ISBN 10:   3030905527
Pages:   147
Publication Date:   30 October 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Cryptanalysis and other attacks.- Symmetric cryptography and hash functions and Mathematical foundations of cryptography.- Embedded systems security and Security in hardware.- Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List