000 | 02742nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-92641-0 | ||
003 | DE-He213 | ||
005 | 20240423125516.0 | ||
007 | cr nn 008mamaa | ||
008 | 211214s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030926410 _9978-3-030-92641-0 |
||
024 | 7 |
_a10.1007/978-3-030-92641-0 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aCryptography and Coding _h[electronic resource] : _b18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings / _cedited by Maura B. Paterson. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aX, 327 p. 38 illus., 7 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13129 |
|
505 | 0 | _aSerious Games Applications -- Serious Game to Improve Literacy -- Technology used for Serious Games -- Serious Game Usage; Serious Games Design. | |
520 | _aThis book constitutes the refereed proceedings of the 18th IMA International Conference on Cryptography and Coding, IMACC 2021, held in December 2021. Due to COVID 19 pandemic the conference was held virtually. The 14 papers presented were carefully reviewed and selected from 30 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory. | ||
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _aCryptology. |
650 | 2 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aMobile and Network Security. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
700 | 1 |
_aPaterson, Maura B. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030926403 |
776 | 0 | 8 |
_iPrinted edition: _z9783030926427 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13129 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-92641-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c178695 _d178695 |