LEADER 04618nam 22009255 450 001 9910484473603321 005 20251226203135.0 010 $a1-280-38306-2 010 $a9786613560971 010 $a3-642-02617-6 024 7 $a10.1007/978-3-642-02617-1 035 $a(CKB)1000000000753948 035 $a(SSID)ssj0000315995 035 $a(PQKBManifestationID)11229634 035 $a(PQKBTitleCode)TC0000315995 035 $a(PQKBWorkID)10255678 035 $a(PQKB)10274736 035 $a(DE-He213)978-3-642-02617-1 035 $a(MiAaPQ)EBC3064306 035 $a(PPN)136306985 035 $a(EXLCZ)991000000000753948 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information Security and Assurance $eThird International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings /$fedited by James (Jong Hyuk) Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Sang-Soo Yeo 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XXXII, 841 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5576 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-02616-8 320 $aIncludes bibliographical references and index. 327 $aCryptographic Algorithms -- Authentication and Identity Management -- Authorization and Access Control -- Biometrics and Computer Forensics -- Cryptographic Protocols -- Data Integrity and Privacy -- Key Management and Recovery -- Mobile and RFID Network Security -- Firewall, IDS, Anti-virus, and Other Security Products -- Internet and Web Services Security -- Cyber-attack and Cyber-terrorism -- Other Security Research -- MoWiN 2009 -- NASSUE 2009 -- IAWSN 2009 -- WNGS 2009 and CGMS 2009 -- SHCI-ISA 2009. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5576 606 $aComputer networks 606 $aData protection 606 $aComputer engineering 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic digital computers$xEvaluation 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aData Structures and Information Theory 606 $aCryptology 606 $aSystem Performance and Evaluation 615 0$aComputer networks. 615 0$aData protection. 615 0$aComputer engineering. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic digital computers$xEvaluation. 615 14$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aData Structures and Information Theory. 615 24$aCryptology. 615 24$aSystem Performance and Evaluation. 676 $a004 701 $aAtiquzzaman$b Mohammed$0846832 701 $aChen$b Hsiao-Hwa$0889479 701 $aKim$b Tai-hoon$01752492 701 $aLee$b Changhoon$01759156 701 $aYeo$b Sang-Soo$01759157 712 12$aInternational Conference on Information Security and Assurance. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484473603321 996 $aAdvances in information security and assurance$94197525 997 $aUNINA