LEADER 04497nam 22008055 450 001 996465597303316 005 20200704211142.0 010 $a3-319-89500-1 024 7 $a10.1007/978-3-319-89500-0 035 $a(CKB)4100000003359639 035 $a(DE-He213)978-3-319-89500-0 035 $a(MiAaPQ)EBC6284135 035 $a(MiAaPQ)EBC5579259 035 $a(Au-PeEL)EBL5579259 035 $a(OCoLC)1034545385 035 $a(PPN)226696553 035 $a(EXLCZ)994100000003359639 100 $a20180409d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security$b[electronic resource] $e19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings /$fedited by Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVI, 689 p. 168 illus.) 225 1 $aSecurity and Cryptology ;$v10631 311 $a3-319-89499-4 327 $aFormal Analysis and Randomness Test -- Signature Scheme and Key Management -- Algorithms -- Applied Cryptography -- Attacks and Attacks Defense -- Wireless Sensor Network Security -- Security Applications -- Malicious Code Defense and Mobile Security -- IoT Security -- Healthcare and Industrial Control System Security -- Privacy Protection -- Engineering Issues of Crypto -- Cloud and E-commerce Security -- Security Protocols -- Network Security. 330 $aThis book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. . 410 0$aSecurity and Cryptology ;$v10631 606 $aData structures (Computer science) 606 $aComputer communication systems 606 $aComputers 606 $aLaw and legislation 606 $aComputers and civilization 606 $aComputer security 606 $aSoftware engineering 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 615 0$aData structures (Computer science). 615 0$aComputer communication systems. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aComputers and civilization. 615 0$aComputer security. 615 0$aSoftware engineering. 615 14$aData Structures and Information Theory. 615 24$aComputer Communication Networks. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aSystems and Data Security. 615 24$aSoftware Engineering. 676 $a343.0999 702 $aQing$b Sihan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Liqun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Dongmei$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465597303316 996 $aInformation and Communications Security$9771899 997 $aUNISA