Information Security Applications

17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Applications by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319565491
Publisher: Springer International Publishing Publication: March 29, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319565491
Publisher: Springer International Publishing
Publication: March 29, 2017
Imprint: Springer
Language: English

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.

The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and  selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols,  cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.

The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and  selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols,  cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security

More books from Springer International Publishing

Cover of the book Universities in the Age of Reform, 1800–1870 by
Cover of the book The Reagan Manifesto by
Cover of the book Universal Access in Human-Computer Interaction. Methods, Techniques, and Best Practices by
Cover of the book Knowledge Production in Organizations by
Cover of the book The Diversity of Russian Estuaries and Lagoons Exposed to Human Influence by
Cover of the book Information Systems Security and Privacy by
Cover of the book Synthetic and Biophysical Studies on the Tridachiahydropyrone Family of Natural Products by
Cover of the book Societies in Transition by
Cover of the book Cosmetic Breast Cases by
Cover of the book Advances in Human Factors in Simulation and Modeling by
Cover of the book Agile Methods by
Cover of the book Biodiversity Offsets by
Cover of the book Population Mobility, Urban Planning and Management in China by
Cover of the book Network Hardening by
Cover of the book Emerging Trends in Information Systems by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy