Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are org...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Qing, Sihan (Editor) 
Zhou, Jianying (Editor) 
Liu, Dongmei (Editor)
Korporace: SpringerLink (online služba)  
Médium: E-kniha
Jazyk:angličtina
Vydáno: Cham : Springer International Publishing, 2013
Edice:Lecture Notes in Computer Science
Žánr/forma:elektronické knihy
ISBN:978-3-319-02726-5
9783319027258
Témata:
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
LEADER 03269nam a22005295i 4500
001 001816400
003 CZ PrSTK
005 20230710101218.0
006 m f d
007 cr nn 008mamaa
008 131030s2013 gw | s |||| 0|eng d
020 |a 978-3-319-02726-5  |9 9783319027265 
024 7 |a 10.1007/978-3-319-02726-5  |2 doi 
040 |a DE-He213  |b cze  |d ABA013 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004  |2 MRF 
245 0 0 |a Information and Communications Security :  |b 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings /  |c edited by Sihan Qing, Jianying Zhou, Dongmei Liu 
264 1 |a Cham :  |b Springer International Publishing,  |c 2013 
300 |a 1 online zdroj (XIV, 414 stran) :  |b 94 ilustrací 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8233 
505 0 |a System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications 
520 |a This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
659 0 |a Computer science 
659 0 |a Computer security 
659 0 |a Data encryption (Computer science) 
659 0 |a Algorithms 
659 1 4 |a Computer Science 
659 2 4 |a Data Encryption 
659 2 4 |a Systems and Data Security 
659 2 4 |a Algorithm Analysis and Problem Complexity 
650 0 7 |a informatika  |x if  |7 psh6548  |2 psh 
650 0 7 |a počítačová bezpečnost  |x vt  |7 psh12336  |2 psh 
650 0 7 |a šifrování dat  |x vt  |7 psh12353  |2 psh 
650 0 7 |a algoritmizace  |x vt  |7 psh12472  |2 psh 
700 1 |a Qing, Sihan  |7 xx0029491  |4 edt 
700 1 |a Zhou, Jianying  |7 xx0040654  |4 edt 
700 1 |a Liu, Dongmei  |4 edt 
710 2 |a SpringerLink (online služba)  |7 ntk2018999494 
776 0 8 |i Tištěné vydání:  |t Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings  |z 9783319027258 
830 0 |a Lecture Notes in Computer Science 
856 4 0 |u https://doi.org/10.1007/978-3-319-02726-5  |y Plný text 
910 |a ABA013 
950 |a Springer  |b Lecture Notes in Computer Science 2017