Normal view MARC view ISBD view

Information Security Applications [electronic resource] : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers / edited by Ho-won Kim, Dooho Choi.

Contributor(s): Kim, Ho-won [editor.] | Choi, Dooho [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 9503Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016.Description: XVI, 438 p. 127 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319318752.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Computer networks  | Electronic data processing -- Management | Data and Information Security | Cryptology | Computer Communication Networks | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.

There are no comments for this item.

Log in to your account to post a comment.