The Resource Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.)
Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.)
Resource Information
The item Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- Annotation This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security
- Language
- eng
- Extent
- 1 online resource (xiv, 432 pages).
- Contents
-
- Digital signatures
- Public key encryption
- Cryptographic protocols
- Applied cryptography
- Multimedia security
- Algorithms and evaluation
- Cryptanalysis
- Security applications
- Wireless network security
- System security
- Network security
- Isbn
- 9783642252433
- Label
- Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings
- Title
- Information and communications security
- Title remainder
- 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings
- Statement of responsibility
- Sihan Qing [and others] (eds.)
- Title variation
- ICICS 2011
- Subject
-
- Coding and Information Theory
- Coding theory
- Computer Communication Networks
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer science
- Computer security
- Computer security
- Computer security -- Congresses
- Computer software
- Conference papers and proceedings
- Conference papers and proceedings
- Data Structures, Cryptology and Information Theory
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Data protection
- Data structures (Computer science)
- Informatique
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
- Language
- eng
- Summary
- Annotation This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security
- Cataloging source
- GW5XE
- Dewey number
- 005.8/2
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I58 2011
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2011
- http://bibfra.me/vocab/lite/meetingName
- ICICS (Conference)
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Qing, Sihan
- Series statement
-
- Lecture notes in computer science,
- LNCS sublibrary. SL 4, Security and cryptology
- Series volume
- 7043
- http://library.link/vocab/subjectName
-
- Data encryption (Computer science)
- Computer networks
- Computer security
- Informatique
- Computer networks
- Computer security
- Data encryption (Computer science)
- Label
- Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and author index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Digital signatures -- Public key encryption -- Cryptographic protocols -- Applied cryptography -- Multimedia security -- Algorithms and evaluation -- Cryptanalysis -- Security applications -- Wireless network security -- System security -- Network security
- Control code
- 760901040
- Dimensions
- unknown
- Extent
- 1 online resource (xiv, 432 pages).
- File format
- unknown
- Form of item
- online
- Isbn
- 9783642252433
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-25243-3
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)760901040
- Label
- Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and author index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Digital signatures -- Public key encryption -- Cryptographic protocols -- Applied cryptography -- Multimedia security -- Algorithms and evaluation -- Cryptanalysis -- Security applications -- Wireless network security -- System security -- Network security
- Control code
- 760901040
- Dimensions
- unknown
- Extent
- 1 online resource (xiv, 432 pages).
- File format
- unknown
- Form of item
- online
- Isbn
- 9783642252433
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-25243-3
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)760901040
Subject
- Coding and Information Theory
- Coding theory
- Computer Communication Networks
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer science
- Computer security
- Computer security
- Computer security -- Congresses
- Computer software
- Conference papers and proceedings
- Conference papers and proceedings
- Data Structures, Cryptology and Information Theory
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Data protection
- Data structures (Computer science)
- Informatique
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-and-communications-security--13th/X0QWd-TFvX0/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-and-communications-security--13th/X0QWd-TFvX0/">Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Information-and-communications-security--13th/X0QWd-TFvX0/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Information-and-communications-security--13th/X0QWd-TFvX0/">Information and communications security : 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, proceedings, Sihan Qing [and others] (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>