Information and Communications Security

19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

Nonfiction, Computers, Advanced Computing, Theory, Networking & Communications, Hardware, General Computing
Cover of the book Information and Communications Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319895000
Publisher: Springer International Publishing Publication: April 17, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783319895000
Publisher: Springer International Publishing
Publication: April 17, 2018
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.

The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.

The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. 

More books from Springer International Publishing

Cover of the book China’s Ethical Revolution and Regaining Legitimacy by
Cover of the book Acid Mine Drainage in South Africa by
Cover of the book Best Practices in Processing and Storage for Hematopoietic Cell Transplantation by
Cover of the book Reverse Entrepreneurship in Latin America by
Cover of the book Asbestos and Mesothelioma by
Cover of the book Advances in Soft Computing by
Cover of the book Astronavigation by
Cover of the book Helium Nano-bubble Formation in Tungsten by
Cover of the book The Life and Creative Works of Paulo Coelho by
Cover of the book Multiple Criteria Decision Aid by
Cover of the book Social Dreaming, Associative Thinking and Intensities of Affect by
Cover of the book Cervical Cancer by
Cover of the book Principles and Practice of Multi-Agent Systems by
Cover of the book Leisure’s Legacy by
Cover of the book Interactive Theorem Proving by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy