Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1018
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qing, Sihan. ; | en_US |
dc.contributor.author | Mitchell, Chris. ; | en_US |
dc.contributor.author | Chen, Liqun. ; | en_US |
dc.contributor.author | Liu, Dongmei. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:26Z | - |
dc.date.available | 2020-05-17T08:24:26Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319895000 ; | en_US |
dc.identifier.isbn | 9783319894997 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1018 | - |
dc.description | Printed edition: ; 9783319894997. ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . ; | en_US |
dc.description.statementofresponsibility | edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu. | en_US |
dc.description.tableofcontents | Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. ; | en_US |
dc.format.extent | XVI, 689 p. 168 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ; | en_US |
dc.relation.haspart | 9783319895000.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Software Engineering | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Information and Communications Security | en_US |
dc.title.alternative | 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319895000.pdf | 32.19 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qing, Sihan. ; | en_US |
dc.contributor.author | Mitchell, Chris. ; | en_US |
dc.contributor.author | Chen, Liqun. ; | en_US |
dc.contributor.author | Liu, Dongmei. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:26Z | - |
dc.date.available | 2020-05-17T08:24:26Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319895000 ; | en_US |
dc.identifier.isbn | 9783319894997 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1018 | - |
dc.description | Printed edition: ; 9783319894997. ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . ; | en_US |
dc.description.statementofresponsibility | edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu. | en_US |
dc.description.tableofcontents | Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. ; | en_US |
dc.format.extent | XVI, 689 p. 168 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ; | en_US |
dc.relation.haspart | 9783319895000.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Software Engineering | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Information and Communications Security | en_US |
dc.title.alternative | 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319895000.pdf | 32.19 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qing, Sihan. ; | en_US |
dc.contributor.author | Mitchell, Chris. ; | en_US |
dc.contributor.author | Chen, Liqun. ; | en_US |
dc.contributor.author | Liu, Dongmei. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:26Z | - |
dc.date.available | 2020-05-17T08:24:26Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319895000 ; | en_US |
dc.identifier.isbn | 9783319894997 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1018 | - |
dc.description | Printed edition: ; 9783319894997. ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . ; | en_US |
dc.description.statementofresponsibility | edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu. | en_US |
dc.description.tableofcontents | Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. ; | en_US |
dc.format.extent | XVI, 689 p. 168 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10631. ; | en_US |
dc.relation.haspart | 9783319895000.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Software Engineering | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data structures (Computer science). ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Software Engineering | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Information and Communications Security | en_US |
dc.title.alternative | 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319895000.pdf | 32.19 MB | Adobe PDF | Preview File |