LEADER 02201oam 2200517 450 001 9910427695203321 005 20210523233320.0 010 $a3-030-61078-0 024 7 $a10.1007/978-3-030-61078-4 035 $a(CKB)4100000011610186 035 $a(MiAaPQ)EBC6414239 035 $a(DE-He213)978-3-030-61078-4 035 $a(PPN)252506642 035 $a(EXLCZ)994100000011610186 100 $a20210523d2020 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aInformation and communications security $e22nd international conference, icics 2020, copenhagen, denmark, august 24-26, 2020, proceedings /$fedited by Weizhi Meng, 3 others 205 $a1st ed. 2020. 210 1$aCham, Switzerland :$cSpringer,$d[2020] 210 4$d©2020 215 $a1 online resource (XVI, 608 p. 51 illus.) 225 1 $aSecurity and Cryptology ;$v12282 300 $aIncludes index. 311 $a3-030-61077-2 327 $aSecurity I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . 330 $aThis book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic. 410 0$aSecurity and Cryptology ;$v12282 606 $aComputer security$vCongresses 606 $aCryptography$vCongresses 606 $aTelecommunication$xSecurity measures$vCongresses 615 0$aComputer security 615 0$aCryptography 615 0$aTelecommunication$xSecurity measures 676 $a005.8 702 $aMeng$b Weizhi$f1986- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910427695203321 996 $aInformation and Communications Security$9771899 997 $aUNINA