Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 15th International Conference, Inscrypt 2019, Nanjing, China, December 68, 2019, Revised Selected Papers 2020 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 562 pages, height x width: 235x155 mm, weight: 872 g, 71 Illustrations, color; 193 Illustrations, black and white; XIV, 562 p. 264 illus., 71 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 12020
  • Izdošanas datums: 04-Apr-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030429202
  • ISBN-13: 9783030429201
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 562 pages, height x width: 235x155 mm, weight: 872 g, 71 Illustrations, color; 193 Illustrations, black and white; XIV, 562 p. 264 illus., 71 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 12020
  • Izdošanas datums: 04-Apr-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030429202
  • ISBN-13: 9783030429201
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.





The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
Invited Papers.- Post-Quantum Cryptography.- AI Security.- Systems Security.- Side Channel Attacks.- Identity-Based Cryptography.- Signatures.- Cryptanalysis.- Authentication.- Mathematical Foundations.