LEADER 03788nam 22007575 450 001 9910349434003321 005 20200705032027.0 010 $a3-319-93563-1 024 7 $a10.1007/978-3-319-93563-8 035 $a(CKB)3810000000358674 035 $a(DE-He213)978-3-319-93563-8 035 $a(MiAaPQ)EBC6288236 035 $a(PPN)229494455 035 $a(EXLCZ)993810000000358674 100 $a20180622d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Applications $e18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers /$fedited by Brent ByungHoon Kang, Taesoo Kim 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XI, 338 p. 124 illus.) 225 1 $aSecurity and Cryptology ;$v10763 300 $aIncludes index. 311 $a3-319-93562-3 327 $aAttack and defense -- Theory in security -- Web security and emerging technologies -- Systems security and authentication -- Crypto protocols -- Attack detections and legal aspects. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017. The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects. 410 0$aSecurity and Cryptology ;$v10763 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aKang$b Brent ByungHoon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Taesoo$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349434003321 996 $aInformation Security Applications$93016702 997 $aUNINA