Information Security Applications [recurso electrónico] : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20?22, 2015, Revised Selected Papers / edited by Ho-won Kim, Dooho Choi.

Colaborador(es): Kim, Ho-won [editor.] | Choi, Dooho [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 9503Editor: Cham : Springer International Publishing : Imprint: Springer, 2016Edición: 1st ed. 2016Descripción: XVI, 438 p. 127 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783319318752Tema(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Management information systems | Computer Science | Systems and Data Security | Data Encryption | Computer Communication Networks | Management of Computing and Information SystemsFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTexto En: Springer eBooksResumen: This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.

Con tecnología Koha