Codes, Cryptology and Information Security

Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Codes, Cryptology and Information Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030164584
Publisher: Springer International Publishing Publication: June 1, 2019
Imprint: Springer Language: English
Author:
ISBN: 9783030164584
Publisher: Springer International Publishing
Publication: June 1, 2019
Imprint: Springer
Language: English

This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.

More books from Springer International Publishing

Cover of the book The Argentina Continental Margin by
Cover of the book Graph Transformation, Specifications, and Nets by
Cover of the book The Pacific Insular Case of American Sāmoa by
Cover of the book Computational Information Geometry by
Cover of the book Speech Recognition Using Articulatory and Excitation Source Features by
Cover of the book Taxation and Development - A Comparative Study by
Cover of the book Studies in Late Medieval Wall Paintings, Manuscript Illuminations, and Texts by
Cover of the book Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology – ISAT 2015 – Part II by
Cover of the book Global Phenomena and Social Sciences by
Cover of the book Geometric Continuum Mechanics and Induced Beam Theories by
Cover of the book Disequilibrium Economics by
Cover of the book Gender and Couple Relationships by
Cover of the book Medical Image Computing and Computer Assisted Intervention – MICCAI 2018 by
Cover of the book Image Processing and Communications Challenges 7 by
Cover of the book Electric Vehicle Business Models by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy