Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 sub...

Full description

Bibliographic Details
Other Authors: Kim, Ho-won (Editor), Choi, Dooho (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2016, 2016
Edition:1st ed. 2016
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 01852nmm a2200361 u 4500
001 EB001189740
003 EBX01000000000000000861877
005 00000000000000.0
007 cr|||||||||||||||||||||
008 160406 ||| eng
020 |a 9783319318752 
100 1 |a Kim, Ho-won  |e [editor] 
245 0 0 |a Information Security Applications  |h Elektronische Ressource  |b 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers  |c edited by Ho-won Kim, Dooho Choi 
250 |a 1st ed. 2016 
260 |a Cham  |b Springer International Publishing  |c 2016, 2016 
300 |a XVI, 438 p. 127 illus  |b online resource 
653 |a Computer Communication Networks 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a IT Operations 
700 1 |a Choi, Dooho  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-319-31875-2 
856 4 0 |u https://doi.org/10.1007/978-3-319-31875-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security