Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The...

Full description

Bibliographic Details
Other Authors: Rhee, Kyung-Hyune (Editor), Yi, Jeong Hyun (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2015, 2015
Edition:1st ed. 2015
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02071nmm a2200373 u 4500
001 EB000937540
003 EBX01000000000000000731132
005 00000000000000.0
007 cr|||||||||||||||||||||
008 150202 ||| eng
020 |a 9783319150871 
100 1 |a Rhee, Kyung-Hyune  |e [editor] 
245 0 0 |a Information Security Applications  |h Elektronische Ressource  |b 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers  |c edited by Kyung-Hyune Rhee, Jeong Hyun Yi 
250 |a 1st ed. 2015 
260 |a Cham  |b Springer International Publishing  |c 2015, 2015 
300 |a XIII, 406 p. 155 illus  |b online resource 
505 0 |a Malware detection -- Mobile security -- Vulnerability analysis -- Applied cryptography -- Network security.-Cryptography -- Hardware security.- Critical infrastructure security and policy 
653 |a Computer Communication Networks 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a IT Operations 
700 1 |a Yi, Jeong Hyun  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-319-15087-1 
856 4 0 |u https://doi.org/10.1007/978-3-319-15087-1?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy