000 04048nam a22007215i 4500
001 978-3-319-89500-0
003 DE-He213
005 20240730175147.0
007 cr nn 008mamaa
008 180409s2018 sz | s |||| 0|eng d
020 _a9783319895000
_9978-3-319-89500-0
024 7 _a10.1007/978-3-319-89500-0
_2doi
050 4 _aQA76.9.D35
050 4 _aQ350-390
072 7 _aUMB
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM021000
_2bisacsh
072 7 _aUMB
_2thema
072 7 _aGPF
_2thema
082 0 4 _a005.73
_223
082 0 4 _a003.54
_223
245 1 0 _aInformation and Communications Security
_h[electronic resource] :
_b19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /
_cedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXVI, 689 p. 168 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v10631
505 0 _aFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security.
520 _aThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. .
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aComputer networks .
_931572
650 0 _aComputers
_xLaw and legislation.
_975151
650 0 _aInformation technology
_xLaw and legislation.
_982531
650 0 _aComputers and civilization.
_921733
650 0 _aData protection.
_97245
650 0 _aSoftware engineering.
_94138
650 1 4 _aData Structures and Information Theory.
_931923
650 2 4 _aComputer Communication Networks.
_9115660
650 2 4 _aLegal Aspects of Computing.
_953952
650 2 4 _aComputers and Society.
_931668
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSoftware Engineering.
_94138
700 1 _aQing, Sihan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115661
700 1 _aMitchell, Chris.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115662
700 1 _aChen, Liqun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115663
700 1 _aLiu, Dongmei.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115664
710 2 _aSpringerLink (Online service)
_9115665
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319894997
776 0 8 _iPrinted edition:
_z9783319895017
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v10631
_9115666
856 4 0 _uhttps://doi.org/10.1007/978-3-319-89500-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89802
_d89802