Narrow your search

Library

KU Leuven (12)

ULB (12)

ULiège (12)

Odisee (9)

Thomas More Kempen (9)

Thomas More Mechelen (9)

UCLL (9)

VIVES (9)

AP (7)

EhB (7)

More...

Resource type

book (20)

digital (7)


Language

English (27)


Year
From To Submit

2018 (2)

2016 (2)

2013 (2)

2011 (3)

2010 (3)

More...
Listing 1 - 10 of 27 << page
of 3
>>
Sort by
Information and communications security : third international conference, ICICS 2001, Xian, China, November 2001. Proceedings
Authors: ---
ISBN: 9783540428800 3540428801 3540456007 Year: 2001 Volume: 2229 Publisher: New York, NY ; Berlin : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.

Keywords

Computer security --- Telecommunication systems --- Sécurité informatique --- Systèmes de télécommunications --- Congresses --- Security measures --- Congresses. --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Systèmes de télécommunications --- Congrès --- Sécurité --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- IT in Business. --- Data processing. --- Computer software. --- Information Systems. --- Cryptology. --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Operating systems --- Business—Data processing. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Foundations --- Distributed processing

Information and communications security : first international conference, ICIS [i.e. ICICS]'97, Beijing, China, November 11-14, 1997 : proceedings
Authors: --- ---
ISBN: 354063696X 9783540696285 Year: 1997 Volume: 1334 Publisher: [Place of publication not identified] Springer

Information and Communications security : 5th international conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, proceedings
Authors: --- ---
ISBN: 3540201505 3540399275 Year: 2003 Volume: 2836 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ICICS 2003, the Fifth International Conference on Information and Communication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer Federation. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to offer the attendees the opportunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call for Papers was surprising. When we were preparing the conference between April and May, China, including the conference venue, Huhehaote City, was fighting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.

Keywords

Computer security --- Telecommunication systems --- Sécurité informatique --- Systèmes de télécommunications --- Congresses --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Systèmes de télécommunications --- Congrès --- Sécurité --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Software, Computer --- Computer systems --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Operating systems --- Protection --- Computer science—Mathematics. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Foundations --- Distributed processing


Book
Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings
Authors: --- ---
ISBN: 3319027255 3319027263 Year: 2013 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.


Digital
Information and Communications Security (vol. # 4307) : 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Authors: --- ---
ISBN: 9783540494973 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Digital
Information and Communications Security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings
Authors: --- ---
ISBN: 9783540770480 Year: 2008 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Digital
Information and Communications Security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings
Authors: --- ---
ISBN: 9783319027265 Year: 2013 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.


Digital
Information and Communications Security : 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings
Authors: --- ---
ISBN: 9783642176500 9783642176494 9783642176517 Year: 2010 Publisher: Berlin, Heidelberg Springer


Book
Information and Communications Security : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings
Authors: --- ---
ISBN: 3319500112 3319500104 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Keywords

Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Data Encryption. --- Data Structures. --- Security. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Sociotechnical systems --- Information resources management --- Management --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Communication systems --- Foundations --- Distributed processing --- Data structures (Computer scienc. --- Data protection. --- Computer software. --- Information Systems. --- Cryptology. --- Data structures (Computer science) --- Software, Computer --- Computer systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Security measures --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting


Book
Information and Communications Security : 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers
Authors: --- --- ---
ISBN: 3319298135 3319298143 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer

Listing 1 - 10 of 27 << page
of 3
>>
Sort by