0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

Information Security Applications - 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers (Paperback, 2005 ed.) Loot Price: R1,675
Discovery Miles 16 750
Information Security Applications - 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised...

Information Security Applications - 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers (Paperback, 2005 ed.)

Chae Hoon Lim, Moti Yung

Series: Security and Cryptology, 3325

 (sign in to rate)
Loot Price R1,675 Discovery Miles 16 750 | Repayment Terms: R157 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries, andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks, entitledSecurityinOutsourcedDatabasesandWhat does 'Security' mean for Ubiquitous Applications?, respectively.

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Security and Cryptology, 3325
Release date: February 2005
First published: 2005
Editors: Chae Hoon Lim • Moti Yung
Dimensions: 235 x 155 x 24mm (L x W x T)
Format: Paperback
Pages: 474
Edition: 2005 ed.
ISBN-13: 978-3-540-24015-0
Categories: Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
LSN: 3-540-24015-2
Barcode: 9783540240150

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners