Network Computing and Information Security

Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by ImportBot
February 26, 2022 | History

Network Computing and Information Security

Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012.
The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.

Publish Date
Language
English
Pages
829

Buy this book

Previews available in: English

Edition Availability
Cover of: Network Computing and Information Security
Network Computing and Information Security: Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings
2012, Springer Berlin Heidelberg, Imprint: Springer
electronic resource : in English
Cover of: Network Computing and Information Security

Add another edition?

Book Details


Table of Contents

Applications of Cryptography
Authentication and Non-repudiation
Cloud Computing
Communication and Information Systems
Design and Analysis of Cryptographic Algorithms
Information Hiding and Watermarking
Intelligent Networked Systems
Multimedia Computing and Intelligence
Network and Wireless Network Security
Network Communication
Parallel and Distributed Systems
Security Modeling and Architectures
Sensor Network
Signal and Information Processing
Virtualization Techniques and Applications
Wireless Network.

Edition Notes

Published in
Berlin, Heidelberg
Series
Communications in Computer and Information Science -- 345

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25, TK5105.59 .I58 2012

The Physical Object

Format
[electronic resource] :
Pagination
XX, 829 p. 104 illus.
Number of pages
829

ID Numbers

Open Library
OL27076878M
Internet Archive
networkcomputing00leij
ISBN 13
9783642352119

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
February 26, 2022 Edited by ImportBot import existing book
August 18, 2021 Edited by MARC Bot import existing book
July 5, 2019 Created by MARC Bot import new book