04234nam 22008535 450 991034942370332120251225202054.09783319895000331989500110.1007/978-3-319-89500-0(CKB)4100000003359639(DE-He213)978-3-319-89500-0(MiAaPQ)EBC6284135(MiAaPQ)EBC5579259(Au-PeEL)EBL5579259(OCoLC)1034545385(PPN)226696553(EXLCZ)99410000000335963920180409d2018 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierInformation and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /edited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XVI, 689 p. 168 illus.)Security and Cryptology,2946-1863 ;106319783319894997 3319894994 Formal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security.This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. .Security and Cryptology,2946-1863 ;10631Data structures (Computer science)Information theoryComputer networksComputersLaw and legislationInformation technologyLaw and legislationComputers and civilizationData protectionSoftware engineeringData Structures and Information TheoryComputer Communication NetworksLegal Aspects of ComputingComputers and SocietyData and Information SecuritySoftware EngineeringData structures (Computer science).Information theory.Computer networks.ComputersLaw and legislation.Information technologyLaw and legislation.Computers and civilization.Data protection.Software engineering.Data Structures and Information Theory.Computer Communication Networks.Legal Aspects of Computing.Computers and Society.Data and Information Security.Software Engineering.343.0999Qing Sihanedthttp://id.loc.gov/vocabulary/relators/edtMitchell Chrisedthttp://id.loc.gov/vocabulary/relators/edtChen Liqunedthttp://id.loc.gov/vocabulary/relators/edtLiu Dongmeiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349423703321Information and Communications Security771899UNINA