LEADER 03707nam 22007335 450 001 9910484401203321 005 20200705013026.0 010 $a3-319-56549-4 024 7 $a10.1007/978-3-319-56549-1 035 $a(CKB)3710000001127401 035 $a(DE-He213)978-3-319-56549-1 035 $a(MiAaPQ)EBC6295513 035 $a(MiAaPQ)EBC5578783 035 $a(Au-PeEL)EBL5578783 035 $a(OCoLC)981910499 035 $a(PPN)199766932 035 $a(EXLCZ)993710000001127401 100 $a20170329d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Applications $e17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers /$fedited by Dooho Choi, Sylvain Guilley 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XI, 398 p. 157 illus.) 225 1 $aSecurity and Cryptology ;$v10144 311 $a3-319-56548-6 327 $aNetwork security -- Threat analysis -- Application security -- Cryptographic protocols -- Cryptanalysis -- Cryptographic implementations -- Authentication using bio and ML -- Authentication -- ICT Convergent security. 330 $aThis book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols, cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security. 410 0$aSecurity and Cryptology ;$v10144 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aArtificial intelligence 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aArtificial intelligence. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aChoi$b Dooho$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGuilley$b Sylvain$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484401203321 996 $aInformation Security Applications$93016702 997 $aUNINA