Editors:
Up-to-date results
Fast track conference proceedings
State-of-the-art report
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7043)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ICICS: International Conference on Information and Communications Security
Conference proceedings info: ICICS 2011.
Buying options
This is a preview of subscription content, access via your institution.
Table of contents (33 papers)
-
Front Matter
About this book
Keywords
- denial-of-service attack
- differential cryptanalysis
- oblivious transfer
- trust measurement
- wireless communication
- algorithm analysis and problem complexity
Editors and Affiliations
-
Institute of Software, Chinese Academy of Sciences, Beijing, China
Sihan Qing
-
Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia
Willy Susilo
-
School of Computer Science & Software Engineering, University of Wollongong, Wollongong, Australia
Guilin Wang
-
Chinese Academy of Sciences, Institute of Software, Beijing, China
Dongmei Liu
Bibliographic Information
Book Title: Information and Communication Security
Book Subtitle: 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings
Editors: Sihan Qing, Willy Susilo, Guilin Wang, Dongmei Liu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-25243-3
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag GmbH Berlin Heidelberg 2011
Softcover ISBN: 978-3-642-25242-6Published: 14 November 2011
eBook ISBN: 978-3-642-25243-3Published: 02 November 2011
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 432
Number of Illustrations: 39 b/w illustrations, 47 illustrations in colour
Topics: Cryptology, Data Structures and Information Theory, Coding and Information Theory, Data and Information Security, Algorithms, Computer Communication Networks