LEADER 03514nam 2200637Ia 450 001 9910484473603321 005 20200520144314.0 010 $a1-280-38306-2 010 $a9786613560971 010 $a3-642-02617-6 024 7 $a10.1007/978-3-642-02617-1 035 $a(CKB)1000000000753948 035 $a(SSID)ssj0000315995 035 $a(PQKBManifestationID)11229634 035 $a(PQKBTitleCode)TC0000315995 035 $a(PQKBWorkID)10255678 035 $a(PQKB)10274736 035 $a(DE-He213)978-3-642-02617-1 035 $a(MiAaPQ)EBC3064306 035 $a(PPN)136306985 035 $a(EXLCZ)991000000000753948 100 $a20090617d2009 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aAdvances in information security and assurance $ethird international conference and workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. proceedings /$fJong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-hoon Kim, Sang-Soo Yeo, editors 205 $a1st ed. 2009. 210 $aBerlin ;$aHeidelberg $cSpringer-Verlag$d2009 215 $a1 online resource (XXXII, 841 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v5576 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-02616-8 320 $aIncludes bibliographical references and index. 327 $aCryptographic Algorithms -- Authentication and Identity Management -- Authorization and Access Control -- Biometrics and Computer Forensics -- Cryptographic Protocols -- Data Integrity and Privacy -- Key Management and Recovery -- Mobile and RFID Network Security -- Firewall, IDS, Anti-virus, and Other Security Products -- Internet and Web Services Security -- Cyber-attack and Cyber-terrorism -- Other Security Research -- MoWiN 2009 -- NASSUE 2009 -- IAWSN 2009 -- WNGS 2009 and CGMS 2009 -- SHCI-ISA 2009. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009. 410 0$aLecture notes in computer science ;$v5576. 606 $aComputer security 606 $aData protection 615 0$aComputer security. 615 0$aData protection. 676 $a004 701 $aAtiquzzaman$b Mohammed$0846832 701 $aChen$b Hsiao-Hwa$0889479 701 $aKim$b Tai-hoon$01752492 701 $aLee$b Changhoon$01759156 701 $aYeo$b Sang-Soo$01759157 712 12$aInternational Conference on Information Security and Assurance 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484473603321 996 $aAdvances in information security and assurance$94197525 997 $aUNINA