Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/795
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Brent ByungHoon. ; | en_US |
dc.contributor.author | Kim, Taesoo. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:12Z | - |
dc.date.available | 2020-05-17T08:22:12Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319935638 ; | en_US |
dc.identifier.isbn | 9783319935621 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/795 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319935621. ; | en_US |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017. The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects. ; | en_US |
dc.description.statementofresponsibility | edited by Brent ByungHoon Kang, Taesoo Kim. | en_US |
dc.description.tableofcontents | Attack and defense -- Theory in security -- Web security and emerging technologies -- Systems security and authentication -- Crypto protocols -- Attack detections and legal aspects. ; | en_US |
dc.format.extent | XI, 338 p. 124 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ; | en_US |
dc.relation.haspart | 9783319935621.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Information Systems Applications | en_US |
dc.title | Information Security Applications | en_US |
dc.title.alternative | 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319935621.pdf | 29.23 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Brent ByungHoon. ; | en_US |
dc.contributor.author | Kim, Taesoo. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:12Z | - |
dc.date.available | 2020-05-17T08:22:12Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319935638 ; | en_US |
dc.identifier.isbn | 9783319935621 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/795 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319935621. ; | en_US |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017. The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects. ; | en_US |
dc.description.statementofresponsibility | edited by Brent ByungHoon Kang, Taesoo Kim. | en_US |
dc.description.tableofcontents | Attack and defense -- Theory in security -- Web security and emerging technologies -- Systems security and authentication -- Crypto protocols -- Attack detections and legal aspects. ; | en_US |
dc.format.extent | XI, 338 p. 124 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ; | en_US |
dc.relation.haspart | 9783319935621.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Information Systems Applications | en_US |
dc.title | Information Security Applications | en_US |
dc.title.alternative | 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319935621.pdf | 29.23 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Brent ByungHoon. ; | en_US |
dc.contributor.author | Kim, Taesoo. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:12Z | - |
dc.date.available | 2020-05-17T08:22:12Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319935638 ; | en_US |
dc.identifier.isbn | 9783319935621 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/795 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319935621. ; | en_US |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017. The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects. ; | en_US |
dc.description.statementofresponsibility | edited by Brent ByungHoon Kang, Taesoo Kim. | en_US |
dc.description.tableofcontents | Attack and defense -- Theory in security -- Web security and emerging technologies -- Systems security and authentication -- Crypto protocols -- Attack detections and legal aspects. ; | en_US |
dc.format.extent | XI, 338 p. 124 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ; | en_US |
dc.relation.haspart | 9783319935621.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Information Systems Applications | en_US |
dc.title | Information Security Applications | en_US |
dc.title.alternative | 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319935621.pdf | 29.23 MB | Adobe PDF | Preview File |