LEADER 04074nam 22008055 450 001 996198831603316 005 20200630013207.0 010 $a3-319-15087-1 024 7 $a10.1007/978-3-319-15087-1 035 $a(CKB)2560000000326193 035 $a(Springer)9783319150871 035 $a(MH)014293529-8 035 $a(SSID)ssj0001424503 035 $a(PQKBManifestationID)11766583 035 $a(PQKBTitleCode)TC0001424503 035 $a(PQKBWorkID)11367545 035 $a(PQKB)11726892 035 $a(DE-He213)978-3-319-15087-1 035 $a(MiAaPQ)EBC6283778 035 $a(MiAaPQ)EBC5578533 035 $a(Au-PeEL)EBL5578533 035 $a(OCoLC)902725804 035 $a(PPN)18352005X 035 $a(EXLCZ)992560000000326193 100 $a20150121d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Applications$b[electronic resource] $e15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers /$fedited by Kyung-Hyune Rhee, Jeong Hyun Yi 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIII, 406 p. 155 illus.)$conline resource 225 1 $aSecurity and Cryptology ;$v8909 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-15086-3 320 $aIncludes bibliographical references and index. 327 $aMalware detection -- Mobile security -- Vulnerability analysis -- Applied cryptography -- Network security.-Cryptography -- Hardware security.- Critical infrastructure security and policy. 330 $aThis book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy. 410 0$aSecurity and Cryptology ;$v8909 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aRhee$b Kyung-Hyune$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYi$b Jeong Hyun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996198831603316 996 $aInformation Security Applications$92569902 997 $aUNISA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress