Information Security and Cryptology (Record no. 14985)

MARC details
000 -LEADER
fixed length control field 01963nam a2200409Ia 4500
000 - LEADER
fixed length control field 04353nam a22004335i 4500
001 - CONTROL NUMBER
control field 978-3-031-26553-2
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240319120804.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230218s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031265532
-- 978-3-031-26553-2
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 5.8
245 ## - TITLE STATEMENT
Title Information Security and Cryptology
Statement of responsibility, etc. edited by Yi Deng, Moti Yung.
Medium [electronic resource] :
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cham
Name of publisher, distributor, etc. Springer Nature Switzerland
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent X, 496 p. 118 illus., 70 illus. in color.
Other physical details online resource.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11-13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application software.
9 (RLIN) 28759
Topical term or geographic name entry element Computer and Information Systems Applications.
9 (RLIN) 28760
Topical term or geographic name entry element Computer Communication Networks.
9 (RLIN) 28761
Topical term or geographic name entry element Computer Imaging, Vision, Pattern Recognition and Graphics.
9 (RLIN) 28762
Topical term or geographic name entry element Computer networks
9 (RLIN) 28763
Topical term or geographic name entry element Computer networks .
9 (RLIN) 28763
Topical term or geographic name entry element Computer vision.
9 (RLIN) 28764
Topical term or geographic name entry element Cryptography.
9 (RLIN) 28765
Topical term or geographic name entry element Cryptology.
9 (RLIN) 28766
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 28767
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 28768
Topical term or geographic name entry element Data protection.
9 (RLIN) 28769
Topical term or geographic name entry element Image processing
9 (RLIN) 28770
Topical term or geographic name entry element Mobile and Network Security.
9 (RLIN) 28771
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Deng, Yi.
9 (RLIN) 28772
Personal name Yung, Moti.
9 (RLIN) 28773
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-26553-2">https://doi.org/10.1007/978-3-031-26553-2</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
        S. R. Ranganathan Learning Hub S. R. Ranganathan Learning Hub Online   Veda Library Solutions Pvt. Ltd., Noida   EB1971 2024-03-19 2024-03-19 e-Book Platform:Springer