Codes, Cryptology and Information Security

Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Codes, Cryptology and Information Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319555898
Publisher: Springer International Publishing Publication: March 7, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319555898
Publisher: Springer International Publishing
Publication: March 7, 2017
Imprint: Springer
Language: English

This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

More books from Springer International Publishing

Cover of the book Principles and Practice of Constraint Programming by
Cover of the book Advances in Knowledge Discovery and Data Mining by
Cover of the book Group Processes by
Cover of the book Rainwater-Smart Agriculture in Arid and Semi-Arid Areas by
Cover of the book Pericyte Biology in Different Organs by
Cover of the book Advances in Through-life Engineering Services by
Cover of the book Singular Phenomena and Scaling in Mathematical Models by
Cover of the book Sustainable Agriculture Reviews by
Cover of the book Trypanosoma cruzi as a Foodborne Pathogen by
Cover of the book Musculoskeletal Ultrasonography in Rheumatic Diseases by
Cover of the book European Yearbook of International Economic Law 2018 by
Cover of the book Evolutionary Perspectives on Social Psychology by
Cover of the book New Classification Method Based on Modular Neural Networks with the LVQ Algorithm and Type-2 Fuzzy Logic by
Cover of the book The Nanoscale Optical Properties of Complex Nanostructures by
Cover of the book Shocks, Singularities and Oscillations in Nonlinear Optics and Fluid Mechanics by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy