The following text field will produce suggestions that follow it as you type.

Barnes and Noble

Loading Inventory...
Information and Communications Security: 27th International Conference, ICICS 2025, Nanjing, China, October 29-31, Proceedings, Part I

Information and Communications Security: 27th International Conference, ICICS 2025, Nanjing, China, October 29-31, Proceedings, Part I in Bloomington, MN

Current price: $89.99
Get it at Barnes and Noble
Information and Communications Security: 27th International Conference, ICICS 2025, Nanjing, China, October 29-31, Proceedings, Part I

Information and Communications Security: 27th International Conference, ICICS 2025, Nanjing, China, October 29-31, Proceedings, Part I in Bloomington, MN

Current price: $89.99
Loading Inventory...

Size: Paperback

Get it at Barnes and Noble
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections:
Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization.
Part II: Blockchain and Crypurrencies, System and Network Security, Security and Privacy of AI, Machine Learning for Security.
Part III: Attack and Defense; Vulnerability Analysis; Anomaly Detection; Traffic Classification; Steganography and Watermarking.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
The 91 full papers presented in this book were carefully selected and reviewed from 357 submissions. The papers are organized in the following topical sections:
Part I: Cryptography; Post-quantum Cryptography; Anonymity and Privacy; Authentication and Authorization.
Part II: Blockchain and Crypurrencies, System and Network Security, Security and Privacy of AI, Machine Learning for Security.
Part III: Attack and Defense; Vulnerability Analysis; Anomaly Detection; Traffic Classification; Steganography and Watermarking.

Find at Mall of America® in Bloomington, MN

Visit at Mall of America® in Bloomington, MN
Powered by Adeptmind