|
Showing 1 - 8 of
8 matches in All Departments
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress
(WCC2000), is being held in Beijing, China from August 21 to 25,
2000. SEC2000 is the annual conference of TCll (Information
Security) of the International Federation of Information
Processing. The conference focuses on the seamless integration of
information security services as an integral part of the Global
Information Infrastructure in the new millenniUm. SEC2000 is
sponsored by the China Computer Federation (CCF), IFIP/TCll, and
Engineering Research Centre for Information Security Technology,
Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers
submitted for inclusion, 50 papers among them have been accepted as
long papers and included in this proceeding, 81 papers have been
accepted as short papers and published in another proceeding. All
papers presented in this conference were reviewed blindly by a
minimum of two international reviewers. The authors' affiliations
of the 180 submissions and the accepted 131 papers range over 26
and 25 countries or regions, respectively. We would like to
appreciate all who have submitted papers to IFIP/SEC2000, and the
authors of accepted papers for their on-time preparation of
camera-ready fmal versions. Without their contribution there would
be no conference. We wish to express our gratitude to all program
committee members and other reviewers for their hard work in
reviewing the papers in a short time and for contributing to the
conference in different ways. We would like to thank Rein Venter
for his time and expertise in compiling the fmal version of the
proceedings.
|
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
|
R3,089
Discovery Miles 30 890
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 20th
International Conference on Information and Communications
Security, ICICS 2018, held in Lille, France, in October 2018. The
39 revised full papers and 11 short papers presented were carefully
selected from 202 submissions. The papers are organized in topics
on blockchain technology, malware, botnet and network security,
real-world cryptography, encrypted computing, privacy protection,
signature schemes, attack analysis and detection, searchable
encryption and identity-based cryptography, verifiable storage and
computing, applied cryptography, supporting techniques, formal
analysis and cryptanalysis, attack detection, and security
management.
|
Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings (Paperback, 2013 ed.)
Sihan Qing, Jianying Zhou, Dongmei Liu
|
R1,579
Discovery Miles 15 790
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 15th
International Conference on Information and Communications
Security, ICICS 2013, held in Beijing, China, in November 2013. The
23 regular papers and 6 short papers were carefully reviewed and
selected from 113 submissions. The papers are organized in topical
sections on system security, Web security and worm detection, cloud
storage security, virtualization for cloud computing, trusted and
trustworthy computing, authentication and security protocols,
intrusion detection and recovery, side channel attacks and defense,
engineering issues of crypto, cryptanalysis, attribute-based
encryption, and cryptographic primitives and applications.
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress
(WCC2000), is being held in Beijing, China from August 21 to 25,
2000. SEC2000 is the annual conference of TCll (Information
Security) of the International Federation of Information
Processing. The conference focuses on the seamless integration of
information security services as an integral part of the Global
Information Infrastructure in the new millenniUm. SEC2000 is
sponsored by the China Computer Federation (CCF), IFIP/TCll, and
Engineering Research Centre for Information Security Technology,
Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers
submitted for inclusion, 50 papers among them have been accepted as
long papers and included in this proceeding, 81 papers have been
accepted as short papers and published in another proceeding. All
papers presented in this conference were reviewed blindly by a
minimum of two international reviewers. The authors' affiliations
of the 180 submissions and the accepted 131 papers range over 26
and 25 countries or regions, respectively. We would like to
appreciate all who have submitted papers to IFIP/SEC2000, and the
authors of accepted papers for their on-time preparation of
camera-ready fmal versions. Without their contribution there would
be no conference. We wish to express our gratitude to all program
committee members and other reviewers for their hard work in
reviewing the papers in a short time and for contributing to the
conference in different ways. We would like to thank Rein Venter
for his time and expertise in compiling the fmal version of the
proceedings.
The11thInternationalConferenceonInformationandCommunicationsSecurity
(ICICS 2009) was held in Beijing, China during December 14-17,
2009. The ICICS conferenceseriesis anestablished forum that
bringstogether people from universities,researchinstitutes,
industry and governmentinstitutions, who work in a range of ?elds
within information and communications security. The ICICS
conferencesgiveattendeestheopportunitytoexchangenewideasandinvestigate
developments in the state of the art. In previous years, ICICS has
taken place in the UK (2008), China (2007, 2005, 2003, 2001 and
1997), USA (2006), Spain (2004), Singapore (2002), and Australia
(1999). On each occasion, as on this one, the proceedings have been
published in the Springer LNCS series. In total, 162 manuscripts
from 20 countries and districts were submitted to ICICS 2009, and a
total of 37 (31 regular papers plus 6 short papers) from 13
countries and districts were accepted (an acceptance rate of 23%).
The accepted papers cover a wide range of disciplines within
information security and applied cryptography. Each submission to
ICICS 2009 was anonymously reviewed by three or four reviewers. We
are very grateful to members of the Program C- mittee, which was
composed of 44 members from 14 countries; we would like to thank
them, as well as all the external referees, for their time and
their valuable contributions to the tough and time-consuming
reviewing process.
|
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings (Paperback, 1st ed. 2018)
Sihan Qing, Chris Mitchell, Liqun Chen, Dongmei Liu
|
R3,278
Discovery Miles 32 780
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 19th
International Conference on Information and Communications
Security, ICICS 2017, held in Beijing, China, in December 2017. The
43 revised full papers and 14 short papers presented were carefully
selected from 188 submissions. The papers cover topics such as
Formal Analysis and Randomness Test; Signature Scheme and Key
Management; Algorithms; Applied Cryptography; Attacks and Attacks
Defense; Wireless Sensor Network Security; Security Applications;
Malicious Code Defense and Mobile Security; IoT Security;
Healthcare and Industrial Control System Security; Privacy
Protection; Engineering Issues of Crypto; Cloud and E-commerce
Security; Security Protocols; Network Security.
|
Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings (Paperback, 1st ed. 2016)
Kwok Yan Lam, Chi-Hung Chi, Sihan Qing
|
R2,936
Discovery Miles 29 360
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 18th
International Conference on Information and Communications
Security, ICISC 2016, held in Singapore, Singapore, in
November/December 2016. The 20 revised full papers and 16 short
papers presented were carefully selected from 60 submissions. The
papers cover topics such as IoT security; cloud security; applied
cryptography; attack behaviour analytics; authentication and
authorization; engineering issues of cryptographic and security
systems; privacy protection; risk evaluation and security; key
management and language-based security; and network security.
|
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
|
R2,971
Discovery Miles 29 710
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the 17th International Conference on Information and
Communications Security, ICISC 2015, held in Beijing, China, in
December 2015. The 24 revised full papers and 19 short papers
presented were carefully selected from 148 submissions. The papers
provide the latest results in research and development in the field
of information security and applied cryptology.
|
|