Overview
- Unique visibility
- State-of-the-art survey
- Fast-track conference proceedings
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6476)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ICICS 2010.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (32 papers)
-
Cryptographic Hash Functions: Theory and Practice
-
Session 1A. Access Control
-
Session 1B. Public Key Cryptography and Cryptanalysis
-
Session 1C. Security in Distributed and Mobile Systems
Other volumes
-
Information and Communications Security
Keywords
Editors and Affiliations
Bibliographic Information
Book Title: Information and Communications Security
Book Subtitle: 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings
Editors: Miguel Soriano, Sihan Qing, Javier López
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-17650-0
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-17649-4Published: 09 December 2010
eBook ISBN: 978-3-642-17650-0Published: 06 December 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 474
Number of Illustrations: 120 b/w illustrations
Topics: Systems and Data Security, Cryptology, Data Structures and Information Theory, Coding and Information Theory, Algorithm Analysis and Problem Complexity, Computer Communication Networks