Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/795
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKang, Brent ByungHoon. ;en_US
dc.contributor.authorKim, Taesoo. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:12Z-
dc.date.available2020-05-17T08:22:12Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319935638 ;en_US
dc.identifier.isbn9783319935621 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/795-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319935621. ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017. The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects. ;en_US
dc.description.statementofresponsibilityedited by Brent ByungHoon Kang, Taesoo Kim.en_US
dc.description.tableofcontentsAttack and defense -- Theory in security -- Web security and emerging technologies -- Systems security and authentication -- Crypto protocols -- Attack detections and legal aspects. ;en_US
dc.format.extentXI, 338 p. 124 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ;en_US
dc.relation.haspart9783319935621.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectInformation Systems Applicationsen_US
dc.titleInformation Security Applicationsen_US
dc.title.alternative18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319935621.pdf29.23 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKang, Brent ByungHoon. ;en_US
dc.contributor.authorKim, Taesoo. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:12Z-
dc.date.available2020-05-17T08:22:12Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319935638 ;en_US
dc.identifier.isbn9783319935621 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/795-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319935621. ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017. The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects. ;en_US
dc.description.statementofresponsibilityedited by Brent ByungHoon Kang, Taesoo Kim.en_US
dc.description.tableofcontentsAttack and defense -- Theory in security -- Web security and emerging technologies -- Systems security and authentication -- Crypto protocols -- Attack detections and legal aspects. ;en_US
dc.format.extentXI, 338 p. 124 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ;en_US
dc.relation.haspart9783319935621.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectInformation Systems Applicationsen_US
dc.titleInformation Security Applicationsen_US
dc.title.alternative18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319935621.pdf29.23 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKang, Brent ByungHoon. ;en_US
dc.contributor.authorKim, Taesoo. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:12Z-
dc.date.available2020-05-17T08:22:12Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319935638 ;en_US
dc.identifier.isbn9783319935621 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/795-
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319935621. ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017. The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects. ;en_US
dc.description.statementofresponsibilityedited by Brent ByungHoon Kang, Taesoo Kim.en_US
dc.description.tableofcontentsAttack and defense -- Theory in security -- Web security and emerging technologies -- Systems security and authentication -- Crypto protocols -- Attack detections and legal aspects. ;en_US
dc.format.extentXI, 338 p. 124 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10763. ;en_US
dc.relation.haspart9783319935621.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectInformation Systems Applicationsen_US
dc.titleInformation Security Applicationsen_US
dc.title.alternative18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319935621.pdf29.23 MBAdobe PDFThumbnail
Preview File