Network Computing and Information Security (eBook, PDF)
Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings Redaktion: Lei, Jingsheng; Luo, Yuan; Li, Mo; Wang, Fu Lee
Network Computing and Information Security (eBook, PDF)
Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings Redaktion: Lei, Jingsheng; Luo, Yuan; Li, Mo; Wang, Fu Lee
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and…mehr
This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Applications of Cryptography.- Authentication and Non-repudiation.- Cloud Computing.- Communication and Information Systems.- Design and Analysis of Cryptographic Algorithms.- Information Hiding and Watermarking.- Intelligent Networked Systems.- Multimedia Computing and Intelligence.- Network and Wireless Network Security.- Network Communication.- Parallel and Distributed Systems.- Security Modeling and Architectures.- Sensor Network.- Signal and Information Processing.- Virtualization Techniques and Applications.- Wireless Network.
Applications of Cryptography.- Authentication and Non-repudiation.- Cloud Computing.- Communication and Information Systems.- Design and Analysis of Cryptographic Algorithms.- Information Hiding and Watermarking.- Intelligent Networked Systems.- Multimedia Computing and Intelligence.- Network and Wireless Network Security.- Network Communication.- Parallel and Distributed Systems.- Security Modeling and Architectures.- Sensor Network.- Signal and Information Processing.- Virtualization Techniques and Applications.- Wireless Network.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826