Overview
Part of the book series: Communications in Computer and Information Science (CCIS, volume 36)
Included in the following conference series:
Conference proceedings info: ISA 2009.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (16 papers)
-
Security Protocol and Its Application
-
Other Security Research
Other volumes
-
Advances in Information Security and Its Application
-
Advances in Information Security and Assurance
Keywords
About this book
Reviews
From the reviews:
"The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. … This book will be useful to both information technology (IT) security researchers and practitioners. … It is well written and easy to understand, and the author provides experimental results that support the design. … suitable for researchers, graduate students (as a reference), and engineers (for self-study)." (Zheng Gong, ACM Computing Reviews, October, 2009)
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Information Security and Its Application
Book Subtitle: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Editors: Jong Hyuk Park, Justin Zhan, Changhoon Lee, Guilin Wang, Tai-hoon Kim, Sang-Soo Yeo
Series Title: Communications in Computer and Information Science
DOI: https://doi.org/10.1007/978-3-642-02633-1
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2009
Softcover ISBN: 978-3-642-02632-4Published: 09 June 2009
eBook ISBN: 978-3-642-02633-1Published: 07 June 2009
Series ISSN: 1865-0929
Series E-ISSN: 1865-0937
Edition Number: 1
Number of Pages: X, 127
Topics: Computer Communication Networks, Systems and Data Security, Computer Systems Organization and Communication Networks, Data Structures and Information Theory, Cryptology, System Performance and Evaluation