Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8909)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: WISA 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (31 papers)
-
Vulnerability Analysis
-
Applied Cryptography
-
Network Security
Other volumes
-
Information Security Applications
Keywords
- Access Control
- Advanced Encryption Standard (AES)
- Block Cipher
- Computer Forensics
- Cryptocurrency
- Cryptography
- Cyber-Attack
- Identity-based Encryption
- Information Security
- Malware
- Permission System
- Phishing
- Public key Cryptography
- Secure Systems
- Security Applications
- Security Protocol
- Security Technologies
- Smartphone
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Applications
Book Subtitle: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers
Editors: Kyung-Hyune Rhee, Jeong Hyun Yi
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-15087-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-15086-4Published: 28 January 2015
eBook ISBN: 978-3-319-15087-1Published: 21 January 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 406
Number of Illustrations: 155 b/w illustrations
Topics: Systems and Data Security, Cryptology, Computer Communication Networks, Management of Computing and Information Systems
Industry Sectors: Aerospace, Automotive, Biotechnology, Electronics, Engineering, Finance, Business & Banking, IT & Software, Law, Pharma, Telecommunications