pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INFORMATION SECURITY APPLICATIONS
5TH INTERNATIONAL WORKSHOP, WISA 2004, JEJU ISLAND, KOREA, AUGUST 23-25, 2004, REVISED SELECTED PAPERS
Volume: Revised Selected Papers
By: Chae Hoon Lim (Editor), Moti Yung (Editor)
Format: Paperback

List price: £85.50


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 3540240152
ISBN 13: 9783540240150
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 9 February, 2005
Series: Lecture Notes in Computer Science / Security and Cryptology v.3325
Pages: 484
Synopsis: The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track.Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does 'Security' mean for Ubiquitous Applications?, respectively.
Illustrations: biography
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
ADVANCES IN CRYPTOLOGY - CRYPTO 2002 (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
COMPUTER SECURITY -- ESORICS 2012 (PB)
CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
DIGITAL RIGHTS MANAGEMENT (PB)
DIGITAL SIGNATURES (HB)
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY (PB)
INFORMATION SECURITY AND CRYPTOLOGY - ICISC (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
INFORMATION SECURITY APPLICATIONS (PB)
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY
MALICIOUS CRYPTOGRAPHY (PB)
NETWORK AND SYSTEM SECURITY (PB)
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016. MALICIOUS AND EXPLORATORY CRYPTOLOGY (PB)
PRACTICAL SIGNCRYPTION (HB)
PRACTICAL SIGNCRYPTION (PB)
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007 (PB)
PUBLIC KEY CRYPTOGRAPHY - PPK (PB)
SECURITY AND CRYPTOGRAPHY FOR NETWORKS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)
TRUSTED SYSTEMS (PB)



Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket