My Account Log in

1 option

Codes, Cryptology, and Information Security : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger / edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
El Hajji, Said, Editor.
Nitaj, Abderrahmane, Editor.
Carlet, Claude, Editor.
Souidi, El Mamoun, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 9084
Security and Cryptology ; 9084
Language:
English
Subjects (All):
Data protection.
Cryptography.
Data encryption (Computer science).
Coding theory.
Information theory.
Algorithms.
Computer science-Mathematics.
Discrete mathematics.
Data and Information Security.
Cryptology.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Local Subjects:
Data and Information Security.
Cryptology.
Coding and Information Theory.
Algorithms.
Discrete Mathematics in Computer Science.
Physical Description:
1 online resource (XXVI, 375 pages) : 58 illustrations
Edition:
1st ed. 2015.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2015.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.
Other Format:
Printed edition:
ISBN:
978-3-319-18681-8
9783319186818
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account