Network Computing and Information Security: Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings

Author:   Jingsheng Lei ,  Fu Lee Wang ,  Mo Li ,  Yuan Luo
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2012 ed.
Volume:   345
ISBN:  

9783642352102


Pages:   829
Publication Date:   31 October 2012
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $290.37 Quantity:  
Add to Cart

Share |

Network Computing and Information Security: Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.

Full Product Details

Author:   Jingsheng Lei ,  Fu Lee Wang ,  Mo Li ,  Yuan Luo
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2012 ed.
Volume:   345
Dimensions:   Width: 15.50cm , Height: 4.20cm , Length: 23.50cm
Weight:   1.282kg
ISBN:  

9783642352102


ISBN 10:   3642352103
Pages:   829
Publication Date:   31 October 2012
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Applications of Cryptography.- Authentication and Non-repudiation.- Cloud Computing.- Communication and Information Systems.- Design and Analysis of Cryptographic Algorithms.- Information Hiding and Watermarking.- Intelligent Networked Systems.- Multimedia Computing and Intelligence.- Network and Wireless Network Security.- Network Communication.- Parallel and Distributed Systems.- Security Modeling and Architectures.- Sensor Network.- Signal and Information Processing.- Virtualization Techniques and Applications.- Wireless Network.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List