登入
選單
返回
Google圖書搜尋
Information and Communications Security
Sihan Qing
Chris J. Mitchell
其他書名
11th International Conference, ICICS 2009
出版
Springer Science & Business Media
, 2009-11-30
主題
Business & Economics / Information Management
Computers / Computer Science
Computers / Database Administration & Management
Computers / Information Theory
Computers / Information Technology
Computers / Networking / General
Computers / Security / Network Security
Computers / Operating Systems / General
Computers / Programming / General
Computers / Software Development & Engineering / General
Computers / Programming / Algorithms
Computers / Security / General
Computers / Networking / Hardware
Computers / Social Aspects
Computers / Security / Cryptography & Encryption
Language Arts & Disciplines / Library & Information Science / General
Law / Science & Technology
Technology & Engineering / Telecommunications
ISBN
3642111440
9783642111440
URL
http://books.google.com.hk/books?id=XfPPjt1sVcoC&hl=&source=gbs_api
EBook
SAMPLE
註釋
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14–17, 2009. The ICICS conferenceseriesis anestablished forum that bringstogether people from universities,researchinstitutes, industry and governmentinstitutions, who work in a range of ?elds within information and communications security. The ICICS conferencesgiveattendeestheopportunitytoexchangenewideasandinvestigate developments in the state of the art. In previous years, ICICS has taken place in the UK (2008), China (2007, 2005, 2003, 2001 and 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings have been published in the Springer LNCS series. In total, 162 manuscripts from 20 countries and districts were submitted to ICICS 2009, and a total of 37 (31 regular papers plus 6 short papers) from 13 countries and districts were accepted (an acceptance rate of 23%). The accepted papers cover a wide range of disciplines within information security and applied cryptography. Each submission to ICICS 2009 was anonymously reviewed by three or four reviewers. We are very grateful to members of the Program C- mittee, which was composed of 44 members from 14 countries; we would like to thank them, as well as all the external referees, for their time and their valuable contributions to the tough and time-consuming reviewing process.