LEADER 03617nam 22006975 450 001 9910357848503321 005 20200706054203.0 010 $a981-15-0818-6 024 7 $a10.1007/978-981-15-0818-9 035 $a(CKB)4100000009844881 035 $a(DE-He213)978-981-15-0818-9 035 $a(MiAaPQ)EBC5974912 035 $a(PPN)25806014X 035 $a(EXLCZ)994100000009844881 100 $a20191017d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFrontiers in Cyber Security $eSecond International Conference, FCS 2019, Xi'an, China, November 15?17, 2019, Proceedings /$fedited by Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (XVII, 365 p. 116 illus., 45 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v1105 311 $a981-15-0817-8 327 $aSymmetric Key Cryptography -- Public Key Cryptography -- Post-quantum Cryptography -- Signature -- Attack and Behavior Detection -- Authenticated Key Agreement -- Blockchain -- System and Network Security. 330 $aThis book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v1105 606 $aComputer security 606 $aData protection 606 $aSoftware engineering 606 $aApplication software 606 $aComputer communication systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aComputer communication systems. 615 14$aSystems and Data Security. 615 24$aSecurity. 615 24$aSoftware Engineering. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 676 $a005.8 702 $aShen$b Bazhong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Baocang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHan$b Jinguang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYu$b Yong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910357848503321 996 $aFrontiers in Cyber Security$92994388 997 $aUNINA