Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1018
Full metadata record
DC FieldValueLanguage
dc.contributor.authorQing, Sihan. ;en_US
dc.contributor.authorMitchell, Chris. ;en_US
dc.contributor.authorChen, Liqun. ;en_US
dc.contributor.authorLiu, Dongmei. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:26Z-
dc.date.available2020-05-17T08:24:26Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319895000 ;en_US
dc.identifier.isbn9783319894997 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1018-
dc.descriptionPrinted edition: ; 9783319894997. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . ;en_US
dc.description.statementofresponsibilityedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu.en_US
dc.description.tableofcontentsFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. ;en_US
dc.format.extentXVI, 689 p. 168 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ;en_US
dc.relation.haspart9783319895000.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSoftware Engineeringen_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleInformation and Communications Securityen_US
dc.title.alternative19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319895000.pdf32.19 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorQing, Sihan. ;en_US
dc.contributor.authorMitchell, Chris. ;en_US
dc.contributor.authorChen, Liqun. ;en_US
dc.contributor.authorLiu, Dongmei. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:26Z-
dc.date.available2020-05-17T08:24:26Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319895000 ;en_US
dc.identifier.isbn9783319894997 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1018-
dc.descriptionPrinted edition: ; 9783319894997. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . ;en_US
dc.description.statementofresponsibilityedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu.en_US
dc.description.tableofcontentsFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. ;en_US
dc.format.extentXVI, 689 p. 168 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ;en_US
dc.relation.haspart9783319895000.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSoftware Engineeringen_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleInformation and Communications Securityen_US
dc.title.alternative19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319895000.pdf32.19 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorQing, Sihan. ;en_US
dc.contributor.authorMitchell, Chris. ;en_US
dc.contributor.authorChen, Liqun. ;en_US
dc.contributor.authorLiu, Dongmei. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:24:26Z-
dc.date.available2020-05-17T08:24:26Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319895000 ;en_US
dc.identifier.isbn9783319894997 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1018-
dc.descriptionPrinted edition: ; 9783319894997. ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.74 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . ;en_US
dc.description.statementofresponsibilityedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu.en_US
dc.description.tableofcontentsFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. ;en_US
dc.format.extentXVI, 689 p. 168 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ;en_US
dc.relation.haspart9783319895000.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer Securityen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectData Structures, Cryptology and Information Theory. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectSystems and Data Securityen_US
dc.subjectSoftware Engineeringen_US
dc.subject.lccQA76.9.D35 ;en_US
dc.titleInformation and Communications Securityen_US
dc.title.alternative19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319895000.pdf32.19 MBAdobe PDFThumbnail
Preview File