Information and Communications Security [electronic resource] : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings / edited by Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing.
Material type: TextSeries: Security and Cryptology ; 9977 | Lecture Notes in Computer Science ; 9977Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016Description: XII, 478 p. 83 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319500119Subject(s): Data encryption (Computer science) | Data structures (Computer science) | Data protection | Algorithms | Computer communication systems | Management information systems | Computer science | Cryptology | Data Structures | Security | Algorithm Analysis and Problem Complexity | Computer Communication Networks | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.D335Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK15040 |
IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management and language-based security -- Network security.
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.
There are no comments on this title.