Information and Communications Security [electronic resource] : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu.
Contributor(s): Qing, Sihan [editor.] | Mitchell, Chris [editor.] | Chen, Liqun [editor.] | Liu, Dongmei [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 10631Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: XVI, 689 p. 168 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319895000.Subject(s): Data structures (Computer science) | Information theory | Computer networks | Computers -- Law and legislation | Information technology -- Law and legislation | Computers and civilization | Data protection | Software engineering | Data Structures and Information Theory | Computer Communication Networks | Legal Aspects of Computing | Computers and Society | Data and Information Security | Software EngineeringAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.73 | 003.54 Online resources: Click here to access onlineFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. .
There are no comments for this item.