Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/2670
Title: Information Security and Cryptology – ICISC 2017
Other Titles: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers /
Authors: Kim, Howon. ; editor. ;;Kim, Dong-Chan. ; editor. ;
subject: Computer Science;Computer Security;Data encryption (Computer science). ;;Artificial Intelligence;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intelligence and Robotics
Year: 2018
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10779 ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10779 ;
Abstract: This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. . ;
Description: 005.8 ; 23 ;



Printed edition: ; 9783319785554 ;
SpringerLink (Online service) ;
QA76.9.A25 ;

URI: http://localhost/handle/Hannan/2670
More Information: XIII, 369 p. 58 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319785561.pdf18.63 MBAdobe PDFThumbnail
Preview File
Title: Information Security and Cryptology – ICISC 2017
Other Titles: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers /
Authors: Kim, Howon. ; editor. ;;Kim, Dong-Chan. ; editor. ;
subject: Computer Science;Computer Security;Data encryption (Computer science). ;;Artificial Intelligence;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intelligence and Robotics
Year: 2018
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10779 ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10779 ;
Abstract: This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. . ;
Description: 005.8 ; 23 ;



Printed edition: ; 9783319785554 ;
SpringerLink (Online service) ;
QA76.9.A25 ;

URI: http://localhost/handle/Hannan/2670
More Information: XIII, 369 p. 58 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319785561.pdf18.63 MBAdobe PDFThumbnail
Preview File
Title: Information Security and Cryptology – ICISC 2017
Other Titles: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers /
Authors: Kim, Howon. ; editor. ;;Kim, Dong-Chan. ; editor. ;
subject: Computer Science;Computer Security;Data encryption (Computer science). ;;Artificial Intelligence;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intelligence and Robotics
Year: 2018
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10779 ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10779 ;
Abstract: This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security. . ;
Description: 005.8 ; 23 ;



Printed edition: ; 9783319785554 ;
SpringerLink (Online service) ;
QA76.9.A25 ;

URI: http://localhost/handle/Hannan/2670
More Information: XIII, 369 p. 58 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319785561.pdf18.63 MBAdobe PDFThumbnail
Preview File