Information Security Applications [recurso electrónico] : 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers / edited by Yongwha Chung, Moti Yung.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 6513Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIII, 352p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642179556Tema(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computers and Society | Systems and Data SecurityFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 004.6 Clasificación LoC:TK5105.5-5105.9Recursos en línea: Libro electrónico En: Springer eBooksResumen: This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | TK5105.5 -5105.9 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 375629-2001 |
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.
19