Information and communications security : 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, proceedings / Weizhi Meng, Dieter Gollmann, Christian D. Jensen, Jianying Zhou (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 12282. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham : Springer, [2020]Description: 1 online resource (609 pages)Content type: - text
- computer
- online resource
- 9783030610784
- 3030610780
- ICICS 2020
- Cryptography -- Congresses
- Computer security -- Congresses
- Telecommunication -- Security measures -- Congresses
- Cryptographie -- Congrès
- Sécurité informatique -- Congrès
- Télécommunications -- Sécurité -- Mesures -- Congrès
- Telecommunication -- Security measures
- Cryptography
- Computer networks
- Computer security
- Computers
- Data encryption (Computer science)
- Data structures (Computer science)
- 005.8 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
"This volume contains the papers that were selected for presentation and publication at the 22nd International Conference on Information and Communications Security (ICICS 2020), which was organized by the Cyber Security Section, Technical University of Denmark, during August 24-26, 2020 ... Due to COVID-19, ICICS was held online for the first time"--Preface
International conference proceedings.
Includes author index.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.
Print version record.
Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI.