Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers /

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The...

Full description

Bibliographic Details
Published in:Springer eBooks
Corporate Author: SpringerLink (Online service)
Other Authors: Rhee, Kyung-Hyune (Editor), Yi, Jeong Hyun (Editor)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Series:Lecture Notes in Computer Science,
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-319-15087-1
Перейти в каталог НБ ТГУ
LEADER 02995nam a22005655i 4500
001 vtls000558890
003 RU-ToGU
005 20210922085806.0
007 cr nn 008mamaa
008 170212s2015 gw | s |||| 0|eng d
020 |a 9783319150871  |9 978-3-319-15087-1 
024 7 |a 10.1007/978-3-319-15087-1  |2 doi 
035 |a to000558890 
039 9 |y 201702122211  |z Александр Эльверович Гилязов 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Information Security Applications  |h electronic resource  |b 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers /  |c edited by Kyung-Hyune Rhee, Jeong Hyun Yi. 
260 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2015.  |9 742221 
300 |a XIII, 406 p. 155 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8909 
505 0 |a Malware detection -- Mobile security -- Vulnerability analysis -- Applied cryptography -- Network security.-Cryptography -- Hardware security.- Critical infrastructure security and policy. 
520 |a This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy. 
650 0 |a Computer Science.  |9 155490 
650 0 |a Computer communication systems.  |9 460401 
650 0 |a Computer security.  |9 348012 
650 0 |a Data encryption (Computer science).  |9 566260 
650 0 |a Management information systems.  |9 299049 
650 1 4 |a Computer Science.  |9 155490 
650 2 4 |a Systems and Data Security.  |9 303939 
650 2 4 |a Data Encryption.  |9 566261 
650 2 4 |a Computer Communication Networks.  |9 566243 
650 2 4 |a Management of Computing and Information Systems.  |9 303227 
700 1 |a Rhee, Kyung-Hyune.  |e editor.  |9 465257 
700 1 |a Yi, Jeong Hyun.  |e editor.  |9 465258 
710 2 |a SpringerLink (Online service)  |9 143950 
773 0 |t Springer eBooks 
830 0 |a Lecture Notes in Computer Science,  |9 279505 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-15087-1 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=413769 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
999 |c 413769  |d 413769