Information and communications security [electronic resource] : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / Sihan Qing, Hideki Imai, Guilin Wang (eds.)
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organi...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , |
Other title: | ICICS 2007. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2007.
|
Series: | Lecture notes in computer science ;
4861. LNCS sublibrary. Security and cryptology. |
Subjects: |
MARC
LEADER | 00000cam a2200000xa 4500 | ||
---|---|---|---|
001 | b8759538 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 081009s2007 gw a ob 101 0 eng d | ||
005 | 20240418142527.5 | ||
010 | |a 2007940029 | ||
019 | |a 190713984 |a 234238561 |a 288247849 |a 488669253 |a 613652075 |a 647891584 |a 870243716 |a 911079134 |a 964921258 | ||
020 | |a 9783540770480 | ||
020 | |a 3540770488 | ||
020 | |a 9783540770473 | ||
020 | |a 354077047X | ||
020 | |a 1281345105 |q (ebk) | ||
020 | |a 9781281345103 |q (ebk) | ||
028 | 5 | 2 | |a 12198054 |
035 | |a (OCoLC)spr261324728 | ||
035 | |a (OCoLC)261324728 |z (OCoLC)190713984 |z (OCoLC)234238561 |z (OCoLC)288247849 |z (OCoLC)488669253 |z (OCoLC)613652075 |z (OCoLC)647891584 |z (OCoLC)870243716 |z (OCoLC)911079134 |z (OCoLC)964921258 | ||
035 | |a (OCoLC)261324728 |z (OCoLC)190713984 |z (OCoLC)234238561 |z (OCoLC)288247849 |z (OCoLC)488669253 |z (OCoLC)613652075 |z (OCoLC)647891584 |z (OCoLC)870243716 |z (OCoLC)911079134 | ||
037 | |a spr10.1007/978-3-540-77048-0 | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d GW5XE |d GZM |d WAU |d STF |d W2U |d YNG |d NUI |d E7B |d OCLCQ |d MND |d OCLCO |d OCLCQ |d OCLCA |d OCLCF |d BEDGE |d DKDLA |d OCLCQ |d OCLCO |d YDXCP |d IDEBK |d OCLCO |d EBLCP |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d VT2 | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 |b .I554 2007eb | |
111 | 2 | |a ICICS (Conference) |n (9th : |d 2007 : |c Zhengzhou Shi, China) | |
245 | 1 | 0 | |a Information and communications security |h [electronic resource] : |b 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / |c Sihan Qing, Hideki Imai, Guilin Wang (eds.) |
246 | 3 | 0 | |a ICICS 2007. |
260 | |a Berlin ; |a New York : |b Springer, |c ©2007. | ||
300 | |a 1 online resource (xiv, 508 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 4861. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Authentication and key exchange -- Digital signatures -- Applications -- Watermarking -- Fast implementations -- Applied cryptography -- Cryptanalysis -- Formal analysis -- System security -- Network security. | |
520 | |a This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101458. | |
650 | 0 | |a Telecommunication systems |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2010115962. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Telecommunication systems |x Security measures. |2 fast |0 (OCoLC)fst01146074. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Qing, Sihan. |0 http://id.loc.gov/authorities/names/n97103567 |1 http://isni.org/isni/0000000122106963. | |
700 | 1 | |a Imai, Hideki, |d 1943- |0 http://id.loc.gov/authorities/names/n83018513 |1 http://isni.org/isni/0000000082075524. | |
700 | 1 | |a Wang, Guilin, |c Dr. |0 http://id.loc.gov/authorities/names/no2008030653 |1 http://isni.org/isni/0000000050846128. | |
776 | 0 | 8 | |i Print version: |a International Conference on Information and Communications Security (9th : 2007 : Zhengzhou Shi, China). |t Information and communications security. |d Berlin ; New York : Springer, ©2007 |z 9783540770473 |z 354077047X |w (DLC) 2007940029 |w (OCoLC)183257704. |
830 | 0 | |a Lecture notes in computer science ; |v 4861. |0 http://id.loc.gov/authorities/names/n42015162. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. |0 http://id.loc.gov/authorities/names/no2007042442. | |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-540-77048-0 |z Full Text (via Springer) |
907 | |a .b87595382 |b 03-19-20 |c 08-16-16 | ||
998 | |a web |b 05-01-17 |c g |d b |e - |f eng |g gw |h 0 |i 1 | ||
907 | |a .b87595382 |b 07-02-19 |c 08-16-16 | ||
944 | |a MARS - RDA ENRICHED | ||
907 | |a .b87595382 |b 07-06-17 |c 08-16-16 | ||
907 | |a .b87595382 |b 05-23-17 |c 08-16-16 | ||
915 | |a I | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2007 English International | ||
999 | f | f | |i 15676ca1-7ae2-51a8-8723-67ec4c6aa85e |s 3e58b625-33f7-5114-b628-2a7e0a745b6d |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 .I554 2007eb |h Library of Congress classification |i Ebooks, Prospector |n 1 |