Overview
- High quality selected papers
- Unique visibility
- State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7690)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: WISA 2012.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.
Similar content being viewed by others
Keywords
Table of contents (25 papers)
-
Secure Hardware/Public Key Crypto Application
-
Cryptographic Protocols/ Digital Forensics
Other volumes
-
Information Security Applications
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Applications
Book Subtitle: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
Editors: Dong Hoon Lee, Moti Yung
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-35416-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2012
Softcover ISBN: 978-3-642-35415-1Published: 13 November 2012
eBook ISBN: 978-3-642-35416-8Published: 15 November 2012
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 371
Number of Illustrations: 135 b/w illustrations
Topics: Computer Communication Networks, Algorithm Analysis and Problem Complexity, Cryptology, Management of Computing and Information Systems, Information Systems Applications (incl. Internet), Systems and Data Security