Editors:
Part of the book series: Communications in Computer and Information Science (CCIS, volume 960)
Conference series link(s): CTCIS: Chinese Conference on Trusted Computing and Information Security
Conference proceedings info: CTCIS 2018.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (24 papers)
-
Front Matter
About this book
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018.
The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.
Keywords
- artificial intelligence
- authentication
- cloud computing
- computer crime
- computer networks
- cryptography
- data mining
- data security
- digital signature
- electronic document identification systems
- encryption
- malware
- public key cryptography
- routing protocols
- sensor networks
- telecommunication networks
- World Wide Web
Editors and Affiliations
-
School of Cyber Science and Engineering, Wuhan University, Wuhan, China
Huanguo Zhang, Bo Zhao, Fei Yan
Bibliographic Information
Book Title: Trusted Computing and Information Security
Book Subtitle: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
Editors: Huanguo Zhang, Bo Zhao, Fei Yan
Series Title: Communications in Computer and Information Science
DOI: https://doi.org/10.1007/978-981-13-5913-2
Publisher: Springer Singapore
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Singapore Pte Ltd. 2019
Softcover ISBN: 978-981-13-5912-5Published: 09 January 2019
eBook ISBN: 978-981-13-5913-2Published: 08 January 2019
Series ISSN: 1865-0929
Series E-ISSN: 1865-0937
Edition Number: 1
Number of Pages: XII, 410
Number of Illustrations: 85 b/w illustrations, 60 illustrations in colour
Topics: Systems and Data Security, Cryptology, Security Services, Information Systems Applications (incl. Internet), Computer Communication Networks