Editors:
Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9543)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICICS: International Conference on Information and Communications Security
Conference proceedings info: ICICS 2015.
Buying options
This is a preview of subscription content, access via your institution.
Table of contents (41 papers)
-
Front Matter
About this book
Keywords
- big data security
- database security
- mobile security
- network security
- system security
- algorithms
- applied cryptography
- authentication
- cloud storage security
- cryptanalysis
- cryptographic protocols
- digital signature
- elliptic curve cryptography
- evaluation
- information security
- multimedia security
- privacy
- security applications
- virtualization security
- wireless network security
Editors and Affiliations
-
Institute of Information Engineering, Chinese Academy of Science, Beijing, China
Sihan Qing
-
Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan
Eiji Okamoto
-
School of Computing, KAIST, Daejeon, Korea (Republic of)
Kwangjo Kim
-
Westone Corporation, Beijing, China
Dongmei Liu
Bibliographic Information
Book Title: Information and Communications Security
Book Subtitle: 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
Editors: Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-29814-6
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2016
Softcover ISBN: 978-3-319-29813-9Published: 08 March 2016
eBook ISBN: 978-3-319-29814-6Published: 08 March 2016
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 486
Number of Illustrations: 133 illustrations in colour
Topics: Cryptology, Data and Information Security, Algorithms, Computer Communication Networks, IT Operations, Computers and Society