Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers - Security and Cryptology 3786 (Paperback)
  • Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers - Security and Cryptology 3786 (Paperback)
zoom

Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers - Security and Cryptology 3786 (Paperback)

(editor), (editor)
£67.99
Paperback 378 Pages / Published: 10/02/2006
  • We can order this

Usually dispatched within 3 weeks

  • This item has been added to your basket
The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22-24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications, with contributions from the academic community as well as from industry. The wo- shop program covers a wide range of security aspects including network security, e-commerce, cryptography, cryptanalysis, applications and implementation - pects. TheProgramCommitteereceived168papersfrom17countries,andaccepted 29 papers for a full presentation track and 16 papers for a short presentation track. Each paper was carefully evaluated through a peer-review process by at least three members of the Program Committee. This volume contains revised versionsof29papersacceptedandpresentedinthefullpresentationtrack.Short papersonlyappearedintheWISA2005pre-proceedingsaspreliminaryversions, and their extended versions may be published elsewhere. In addition to the contributed papers, the workshop had ?ve special talks. Moti Yung gave a tutorial talk, entitled "Malware Meets Cryptography." Virgil Gligor and Michel Abdalla gave invited talks in the full presentation track, en- tled "On the Evolution of Adversary Models in Security Protocols" and "Public- Key Encryption with Keyword Search," respectively. Finally, Shozo Naito and Jonguk Choi gave invited talks in the short presentation track, entitled "New RSA-Type Public-Key Cryptosystem and Its Performance Evaluation" and "A New Booming Era of DRM: Applications and Extending Business," respectively.

Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
ISBN: 9783540310129
Number of pages: 378
Weight: 1220 g
Dimensions: 233 x 155 x 20 mm
Edition: 2006 ed.

You may also be interested in...

The Art of Deception
Added to basket
Exploding Data
Added to basket
£20.00
Hardback
Privacy
Added to basket
£10.99
Paperback
The Perfect Weapon
Added to basket
Democracy Hacked
Added to basket
£16.99
Hardback
Surveillance Valley
Added to basket
£14.99
Paperback
The Truth Machine
Added to basket
Hacking For Dummies
Added to basket
£23.99
Paperback
Cyber Security
Added to basket
£24.99
Paperback
The Cyber Effect
Added to basket
£10.99
Paperback
Desk Wars
Added to basket
£9.99
Paperback
Cyberphobia
Added to basket
£9.99
Paperback
DarkMarket
Added to basket
£10.99
Paperback
Cyber Attack Survival Manual
Added to basket

Reviews

Please sign in to write a review

Your review has been submitted successfully.