Record ID | harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:921825234:2745 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:921825234:2745?format=raw |
LEADER: 02745nam a22004815a 4500
001 013818911-0
005 20131206191754.0
008 131030s2013 gw | s ||0| 0|eng d
020 $a9783319027265
020 $a9783319027265
020 $a9783319027258
024 7 $a10.1007/978-3-319-02726-5$2doi
035 $a(Springer)9783319027265
040 $aSpringer
050 4 $aQA76.9.A25
072 7 $aURY$2bicssc
072 7 $aCOM053000$2bisacsh
082 04 $a005.82$223
100 1 $aQing, Sihan,$eeditor.
245 10 $aInformation and Communications Security :$b15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings /$cedited by Sihan Qing, Jianying Zhou, Dongmei Liu.
264 1 $aCham :$bSpringer International Publishing :$bImprint: Springer,$c2013.
300 $aXIV, 414 p. 94 illus.$bonline resource.
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file$bPDF$2rda
490 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v8233
505 0 $aSystem Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications.
520 $aThis book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.
650 10 $aComputer science.
650 0 $aData encryption (Computer science)
650 0 $aComputer science.
650 0 $aData protection.
650 0 $aComputer software.
650 24 $aData Encryption.
650 24 $aSystems and Data Security.
650 24 $aAlgorithm Analysis and Problem Complexity.
700 1 $aLiu, Dongmei,$eeditor.
700 1 $aZhou, Jianying,$eeditor.
776 08 $iPrinted edition:$z9783319027258
830 0 $aLecture Notes in Computer Science ;$v8233.
988 $a20131102
906 $0VEN