Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
Resource Information
The work Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings represents a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
The Resource
Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
Resource Information
The work Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings represents a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
- Label
- Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
- Title remainder
- 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
- Statement of responsibility
- edited by Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu
- Subject
-
- Coding and Information Theory
- Coding theory
- Computer Communication Networks
- Computer Science
- Computer Security
- Computer science
- Computer software
- Data Encryption
- Data Structures, Cryptology and Information Theory
- Data encryption (Computer science)
- Data protection
- Data structures (Computer science)
- Systems and Data Security
- Telecommunication Systems
- Algorithm Analysis and Problem Complexity
- Language
- eng
- Summary
-
- This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security
- This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security
- This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security
- Annotation:
- Dewey number
- 005.82
- LC call number
- QA76.9.A25
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 7043
- Summary expansion
- This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security
Context
Context of Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. ProceedingsWork of
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/3pdbBft3_L4/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/3pdbBft3_L4/">Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/3pdbBft3_L4/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/3pdbBft3_L4/">Information and Communications Security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>