LEADER 04234nam 22008535 450 001 9910349423703321 005 20251225202054.0 010 $a9783319895000 010 $a3319895001 024 7 $a10.1007/978-3-319-89500-0 035 $a(CKB)4100000003359639 035 $a(DE-He213)978-3-319-89500-0 035 $a(MiAaPQ)EBC6284135 035 $a(MiAaPQ)EBC5579259 035 $a(Au-PeEL)EBL5579259 035 $a(OCoLC)1034545385 035 $a(PPN)226696553 035 $a(EXLCZ)994100000003359639 100 $a20180409d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security $e19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /$fedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVI, 689 p. 168 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10631 311 08$a9783319894997 311 08$a3319894994 327 $aFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. 330 $aThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10631 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer networks 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputers and civilization 606 $aData protection 606 $aSoftware engineering 606 $aData Structures and Information Theory 606 $aComputer Communication Networks 606 $aLegal Aspects of Computing 606 $aComputers and Society 606 $aData and Information Security 606 $aSoftware Engineering 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer networks. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputers and civilization. 615 0$aData protection. 615 0$aSoftware engineering. 615 14$aData Structures and Information Theory. 615 24$aComputer Communication Networks. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aData and Information Security. 615 24$aSoftware Engineering. 676 $a343.0999 702 $aQing$b Sihan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Liqun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Dongmei$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349423703321 996 $aInformation and Communications Security$9771899 997 $aUNINA