000 01851nam a2200301 a 4500
999 _c29182
_d29182
001 64159
020 _a9783319219653
082 _a005.8 IN FO
245 1 0 _aInformation and communications security :
_b16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014
_cedited by Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu
250 _aRevised selected paper
260 _aCham :
_bSpringer,
_cc2015.
300 _ax, 320 p. :
_bill. ;
_c24 cm.
490 1 _aLecture notes in computer science
505 0 _aSecurity -- Cryptography -- Secure protocols -- Secure applications -- Security proofs -- Secure systems -- Applied cryptography -- Access control -- Privacy protection -- Network security.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
650 7 _aComputer networks
_xSecurity measures
_xCongresses
_923267
650 7 _aData protection
_vCongresses
_938673
650 7 _aData encryption (Computer science)
_yCongresses
_938674
650 7 _aComputer networks
_xSecurity measures
_92602
650 7 _aData protection
_910592
650 7 _aData encryption (Computer science)
_95422
700 _aChi-Kwong Hui, Lucas,
_eEdited by
_938675
700 _aQing, S.H.,
_eEdited by
_938676
700 _aShi, Elaine,
_eEdited by
_938677
700 _aYiu, S.M.,
_eEdited by
_938678
856 _uhttps://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8
_zLocation Map
942 _cREGULAR
_2ddc