Editors:
Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3325)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): WISA: International Conference on Information Security Applications
Conference proceedings info: WISA 2004.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (36 papers)
-
Front Matter
-
Digital Rights Management
About this book
Keywords
- Information
- Linux
- Smart Card
- applied cryptography
- communication
- computer security
- cryptographic attacks
- data security
- information security
- intrusion detection
- privacy
- public key cryptography
- secure networking
- security
- systems security
- algorithm analysis and problem complexity
Editors and Affiliations
-
Dept. of Computer Engineering, Sejong University, Seoul, Korea
Chae Hoon Lim
-
Computer Science Department, Google Inc. and Columbia University, New York, NY, USA
Moti Yung
Bibliographic Information
Book Title: Information Security Applications
Book Subtitle: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Editors: Chae Hoon Lim, Moti Yung
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/b103174
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2005
Softcover ISBN: 978-3-540-24015-0Published: 09 February 2005
eBook ISBN: 978-3-540-31815-6Published: 10 February 2005
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 474
Topics: Cryptology, Operating Systems, Algorithms, Computer Communication Networks, IT Operations, Special Purpose and Application-Based Systems