Normal view MARC view ISBD view

Information Security Applications [electronic resource] : 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers / edited by Yongwha Chung, Moti Yung.

Contributor(s): Chung, Yongwha [editor.] | Yung, Moti [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 6513Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XIII, 352 p. 105 illus., 52 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642179556.Subject(s): Computer networks  | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Algorithms | Computers and civilization | Data protection | Computer Communication Networks | Cryptology | IT Operations | Algorithms | Computers and Society | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

There are no comments for this item.

Log in to your account to post a comment.