Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4298)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): WISA: International Conference on Information Security Applications
Conference proceedings info: WISA 2006.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (30 papers)
-
Front Matter
-
Cyber Indication/Intrusion Detection
-
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
Keywords
- AES
- DRM
- IPv6
- Information
- Public Key
- SQL
- Smart Card
- Ubiquitous Computing
- access control
- algorithm
- anonymity
- cryptographic hardware
- cryptographic protocols
- data security
- privacy
- algorithm analysis and problem complexity
Bibliographic Information
Book Title: Information Security Applications
Book Subtitle: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Editors: Jae Kwang Lee, Okyeon Yi, Moti Yung
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-71093-6
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2007
Softcover ISBN: 978-3-540-71092-9Published: 30 March 2007
eBook ISBN: 978-3-540-71093-6Published: 30 May 2007
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 410
Topics: Cryptology, Data and Information Security, Algorithms, Computer Communication Networks, IT Operations, Special Purpose and Application-Based Systems