Network Computing and Information Security [Recurso electrónico] : Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings / edited by Jingsheng Lei, Fu Lee Wang, Mo Li, Yuan Luo.

Por: Lei, JingshengColaborador(es): Wang, Fu Lee | Li, Mo | Luo, YuanTipo de material: TextoTextoSeries Communications in Computer and Information Science ; 345Detalles de publicación: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012. ISBN: 9783642352119Tema(s): Computer science | Computer Communication Networks | Computer system performance | Data protection | Information systems | Electronic data processing | Computer Science | Systems and Data Security | Computer Communication Networks | Computing Methodologies | Information Systems and Communication Service | System Performance and EvaluationFormatos físicos adicionales: Printed edition:: Sin títuloRecursos en línea: Texto completo
Contenidos:
Applications of Cryptography -- Authentication and Non-repudiation -- Cloud Computing -- Communication and Information Systems -- Design and Analysis of Cryptographic Algorithms -- Information Hiding and Watermarking -- Intelligent Networked Systems -- Multimedia Computing and Intelligence -- Network and Wireless Network Security -- Network Communication -- Parallel and Distributed Systems -- Security Modeling and Architectures -- Sensor Network -- Signal and Information Processing -- Virtualization Techniques and Applications -- Wireless Network.
Forma de acceso: Restringido a usuarios de la UCAResumen: This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. <br>The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Inicie sesión para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Applications of Cryptography -- Authentication and Non-repudiation -- Cloud Computing -- Communication and Information Systems -- Design and Analysis of Cryptographic Algorithms -- Information Hiding and Watermarking -- Intelligent Networked Systems -- Multimedia Computing and Intelligence -- Network and Wireless Network Security -- Network Communication -- Parallel and Distributed Systems -- Security Modeling and Architectures -- Sensor Network -- Signal and Information Processing -- Virtualization Techniques and Applications -- Wireless Network.

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. <br>The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.

Restringido a usuarios de la UCA

Modo de acceso: World Wide Web

No hay comentarios en este titulo.

para aportar su opinión.

Con tecnología Koha