000 | 04048nam a22007215i 4500 | ||
---|---|---|---|
001 | 978-3-319-89500-0 | ||
003 | DE-He213 | ||
005 | 20240730175147.0 | ||
007 | cr nn 008mamaa | ||
008 | 180409s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319895000 _9978-3-319-89500-0 |
||
024 | 7 |
_a10.1007/978-3-319-89500-0 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
245 | 1 | 0 |
_aInformation and Communications Security _h[electronic resource] : _b19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / _cedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXVI, 689 p. 168 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10631 |
|
505 | 0 | _aFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. | |
520 | _aThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . | ||
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 1 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aComputer Communication Networks. _9115660 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
700 | 1 |
_aQing, Sihan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115661 |
|
700 | 1 |
_aMitchell, Chris. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115662 |
|
700 | 1 |
_aChen, Liqun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115663 |
|
700 | 1 |
_aLiu, Dongmei. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115664 |
|
710 | 2 |
_aSpringerLink (Online service) _9115665 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319894997 |
776 | 0 | 8 |
_iPrinted edition: _z9783319895017 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10631 _9115666 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-89500-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89802 _d89802 |