02833nam 22006135 450 991048410150332120200630152851.03-319-05149-010.1007/978-3-319-05149-9(CKB)3710000000095006(DE-He213)978-3-319-05149-9(SSID)ssj0001187248(PQKBManifestationID)11697455(PQKBTitleCode)TC0001187248(PQKBWorkID)11256869(PQKB)11770636(MiAaPQ)EBC3101223(PPN)177824476(EXLCZ)99371000000009500620140307d2014 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers /edited by Yongdae Kim, Heejo Lee, Adrian Perrig1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XII, 273 p. 79 illus.) Security and Cryptology ;8267Bibliographic Level Mode of Issuance: Monograph3-319-05148-2 Cryptography -- Social network security -- Mobile security -- Network security -- Future applications -- Privacy.This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.Security and Cryptology ;8267Computer securityData encryption (Computer science)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer security.Data encryption (Computer science).Systems and Data Security.Cryptology.005.8Kim Yongdaeedthttp://id.loc.gov/vocabulary/relators/edtLee Heejoedthttp://id.loc.gov/vocabulary/relators/edtPerrig Adrianedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484101503321Information Security Applications3016702UNINA