Information and communications security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings /

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012.<br>The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The pap...

Descrición completa

Gardado en:
Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Outros autores: Yuen, Tsz Hon, Chim, Tat Wing
Formato: eBook
Idioma:English
Publicado: Berlin, Heidelberg Imprint: Springer 2012.
Series:Lecture Notes in Computer Science 7618
Subjects:
Acceso en liña:Click here to view the full text content
Tags: Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
LEADER 02233nam a2200445 i 4500
001 vtls000106270
003 MY-ArUMP
005 20210731152147.0
006 m fo d
007 cr nn 008mamaa
008 121201s2012 gw | fs |||| 0|eng d
020 |a 9783642341298 
039 9 |a 201305281438  |b SMI  |c 201212010025  |d NY  |y 201211141247  |z SMR 
040 |a MYPMP  |b eng  |c MYPMP  |e rda 
245 1 0 |a Information and communications security :  |b 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings /  |c edited by Tat Wing Chim, Tsz Hon Yuen. 
264 1 |a Berlin, Heidelberg  |b Imprint: Springer  |c 2012. 
300 |a 1 Online resource (XVI, 506 pages)  |b 120 illustration, digital. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resources  |b nr  |2 rdacarrie 
490 0 |a Lecture Notes in Computer Science  |x 0302-9743  |v 7618 
520 |a This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012.<br>The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation. 
650 0 |a Computer science. 
650 0 |a Computer Communication Networks. 
650 0 |a Data protection. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 0 |a Computer software. 
700 1 |a Yuen, Tsz Hon. 
700 1 |a Chim, Tat Wing. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642341281 
830 0 |a Lecture Notes in Computer Science  |x 0302-9743  |v 7618 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34129-8  |y Click here to view the full text content 
942 |2 lcc  |c BK-EBOOK 
949 |a VIRTUAITEM  |d 10011  |f 1  |x 9 
999 |c 49499  |d 49499 
952 |0 0  |1 0  |2 lcc  |4 0  |7 0  |9 45132  |a FSGM  |b FSGM  |d 2021-07-31  |l 0  |r 2021-07-31  |t 1  |w 2021-07-31  |y BK-EBOOK