The Resource Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource)
Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource)
Resource Information
The item Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
-
- This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications
- This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications
- This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications
- Language
- eng
- Contents
-
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- Isbn
- 9783319027265
- Label
- Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
- Title
- Information and Communications Security
- Title remainder
- 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
- Statement of responsibility
- edited by Sihan Qing, Jianying Zhou, Dongmei Liu
- Language
- eng
- Summary
-
- This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications
- This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications
- This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications
- Dewey number
- 005.82
- LC call number
- QA76.9.A25
- http://library.link/vocab/relatedWorkOrContributorName
-
- Qing, Sihan
- Zhou, Jianying
- Liu, Dongmei
- SpringerLink (Online service)
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 8233
- http://library.link/vocab/subjectName
-
- Computer science
- Computer security
- Data encryption (Computer science)
- Algorithms
- Computer Science
- Data Encryption
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
- Label
- Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource)
- Contents
-
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- Control code
- OCM1bookssj0001120894
- Dimensions
- unknown
- Isbn
- 9783319027265
- Other control number
- 10.1007/978-3-319-02726-5
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0001120894
- Label
- Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource)
- Contents
-
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- System Security -- Web Security and Worm Detection -- Cloud Storage Security -- Virtualization for Cloud Computing -- Trusted and Trustworthy Computing -- Authentication and Security Protocols -- Intrusion Detection and Recovery -- Side Channel Attacks and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications
- Control code
- OCM1bookssj0001120894
- Dimensions
- unknown
- Isbn
- 9783319027265
- Other control number
- 10.1007/978-3-319-02726-5
- Specific material designation
- remote
- System control number
- (WaSeSS)bookssj0001120894
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Information-and-Communications-Security--15th/OkCe0wrqmDQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Information-and-Communications-Security--15th/OkCe0wrqmDQ/">Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Information-and-Communications-Security--15th/OkCe0wrqmDQ/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Information-and-Communications-Security--15th/OkCe0wrqmDQ/">Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, edited by Sihan Qing, Jianying Zhou, Dongmei Liu, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>