Information and Communications Security: 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings

Author:   Sihan Qing ,  Jianying Zhou ,  Dongmei Liu ,  Liping Ding
Publisher:   Springer International Publishing AG
Edition:   2013 ed.
Volume:   8233
ISBN:  

9783319027258


Pages:   414
Publication Date:   16 October 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $194.04 Quantity:  
Add to Cart

Share |

Information and Communications Security: 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.

Full Product Details

Author:   Sihan Qing ,  Jianying Zhou ,  Dongmei Liu ,  Liping Ding
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2013 ed.
Volume:   8233
Dimensions:   Width: 15.50cm , Height: 2.20cm , Length: 23.50cm
Weight:   0.652kg
ISBN:  

9783319027258


ISBN 10:   3319027255
Pages:   414
Publication Date:   16 October 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

System Security.- Web Security and Worm Detection.- Cloud Storage Security.- Virtualization for Cloud Computing.- Trusted and Trustworthy Computing.- Authentication and Security Protocols.- Intrusion Detection and Recovery.- Side Channel Attacks and Defense.- Engineering Issues of Crypto.- Cryptanalysis.- Attribute-Based Encryption.- Cryptographic Primitives and Applications.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List