Information and communications security [electronic resource] : 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised selected papers / Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu (eds.).
2015
QA76.9.A25
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Information and communications security [electronic resource] : 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised selected papers / Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu (eds.).
Meeting Name
ISBN
9783319219660 electronic book
3319219669 electronic book
9783319219653
3319219669 electronic book
9783319219653
Published
Cham : Springer, 2015.
Language
English
Description
1 online resource (x, 321 pages) : illustrations.
Item Number
10.1007/978-3-319-21966-0 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed August 6, 2015).
Added Author
Series
Lecture notes in computer science ; 8958. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Record Appears in
Table of Contents
Security
Cryptography
Secure protocols
Secure applications
Security proofs
Secure systems
Applied cryptography
Access control
Privacy protection
Network security.
Cryptography
Secure protocols
Secure applications
Security proofs
Secure systems
Applied cryptography
Access control
Privacy protection
Network security.