Amazon cover image
Image from Amazon.com

Information and communications security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, proceedings / edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu.

By: (19th : ICICS (Conference) (19th : 2017 : Beijing, China)Contributor(s): Qing, Sihan [editor.] | Mitchell, Chris [editor.] | Chen, Liqun [editor.] | Liu, Dongmei (Computer scientist) [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 10631. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham : Springer, 2018Description: 1 online resource (XVI, 689 pages) : 168 illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319895000; 3319895001Subject(s): Computer security -- Congresses | Telecommunication systems -- Security measures -- Congresses | Network hardware | Legal aspects of IT | Ethical & social aspects of IT | Computer security | Software Engineering | Algorithms & data structures | Computers -- Hardware -- Network Hardware | Law -- Science & Technology | Computers -- Social Aspects -- General | Computers -- Security -- General | Computers -- Software Development & Engineering -- General | Computers -- Information Theory | Telecommunication systems -- Security measures | Computer networks | Computer science | Computer security | Computers | Computers and civilization | Data structures (Computer science) | Software engineeringGenre/Form: Conference papers and proceedings. | Electronic books. | Electronic books. Additional physical formats: Printed edition:: No titleDDC classification: 005.74 LOC classification: QA76.9.D35Online resources: Click here to access online
Contents:
Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security.
Summary: This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security.

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security.

Powered by Koha